• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Obama Administration Creates Cyber Czar to Secure IT Infrastructure

    June 1, 2009 Timothy Prickett Morgan

    It looks like the politicians have finally figured out how important–and how vulnerable–America’s digital infrastructure is. Last Friday, the Obama Administration said that it would be creating a “cyber czar” Cabinet-level position to help better secure government and private IT infrastructure. The edges between these, as you all know, has been blurred by the Big Gray Cloud, or the InterTubes, or whatever you want to call it. (OK, the Internet.)

    In his remarks to the press, President Obama made his concern over security IT assets clear by coming clean on the fact that his presidential campaign had been hacked. “It’s no secret that my presidential campaign harnessed the Internet and technology to transform our politics,” Obama said in his statement announcing the formation of the cyber czar position. “What isn’t widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising Website was untouched. [Laughter.] So your confidential personal and financial information was protected. But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA, with the FBI, and the Secret Service, and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths–in our case, our ability to communicate to a wide range of supporters through the Internet–could also be one of your greatest vulnerabilities.”

    (You can read President Obama’s full remarks at this link.)

    Obama also admitted that thousands of U.S. military systems had been infected with malware through the use of thumb flash drives, and said that enough is enough. To that end, the National Security Council and the Homeland Security Council have been instructed to do a top-to-bottom review of Uncle Sam’s IT security and the information and communications networks on which the country depends for our lives and jobs. And he added that he would be personally picking the new Cybersecurity Coordinator, who will orchestrate IT security for Uncle Sam as well as interfacing with the Office of Management and Budget to make sure security doesn’t get back-burnered when cuts have to be made. The big goal is to get Federal and state governments as well as the public and private companies that run the zillions of nodes on the Internet to provide coordinated countermeasures to attacks on the Internet when they occur.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 21 -- June 1, 2009

    Sponsored by
    New Generation Software

    Do you work on IBM i? Do you need help explaining IBM’s strategy, navigating your company’s upgrade options, or learning about IBM i releases and TRFs? Would you benefit from current programming and application development tips and links to educational resources?

    NGS has created an IBM i resources page just for you. Don’t search the web and hope to find answers to your IBM i questions.

    Visit https://ngsi.news/ilinks

    We also encourage you to visit www.ngsi.com to learn about the latest release of NGS-IQ, our IBM i query, reporting, and analytics software.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    COMMON Europe Needs Your Input on Top i Concerns OpenSpan Aims to Bring Mainframe Qualities to Desktop Integration

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 21

This Issue Sponsored By

    Table of Contents

    • IBM Makes the Case for Power Systems SSDs
    • Server Sales Breakdown Bigtime in the First Quarter
    • COBOL at 50: Same Age as Barbie, But More Like Rodney
    • Why Are Systems Programmers Always To Blame?
    • OCEAN Conference Emphasizes Higher Education, Lower Fees
    • Clarification on IBM’s Power Systems Withdrawals
    • Obama Administration Creates Cyber Czar to Secure IT Infrastructure
    • IBM Sues to Stop Exec from Getting a Dell (Paycheck)
    • Looks Like It Will be i 7 for that Future Release
    • IBM Kicks in $5 Billion in Financing to Chase Stimulus Projects

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Stacking Up Power10 And Power11 Systems Price/Performance
    • Where Infor Is Headed With Its ERPs For IBM i
    • Rocket Delivers More DevOps Capabilities For IBM i
    • A Few More Power Systems Announcements Before Year End
    • IBM i PTF Guide, Volume 27, Number 46
    • Bang For The Buck On Entry Power10 And Power11 Machines
    • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
    • Fresche Taps AI For New RPG-To-Java Conversion Tool
    • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
    • IBM i PTF Guide, Volume 27, Number 45

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle