• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Obama Administration Creates Cyber Czar to Secure IT Infrastructure

    June 1, 2009 Timothy Prickett Morgan

    It looks like the politicians have finally figured out how important–and how vulnerable–America’s digital infrastructure is. Last Friday, the Obama Administration said that it would be creating a “cyber czar” Cabinet-level position to help better secure government and private IT infrastructure. The edges between these, as you all know, has been blurred by the Big Gray Cloud, or the InterTubes, or whatever you want to call it. (OK, the Internet.)

    In his remarks to the press, President Obama made his concern over security IT assets clear by coming clean on the fact that his presidential campaign had been hacked. “It’s no secret that my presidential campaign harnessed the Internet and technology to transform our politics,” Obama said in his statement announcing the formation of the cyber czar position. “What isn’t widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising Website was untouched. [Laughter.] So your confidential personal and financial information was protected. But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA, with the FBI, and the Secret Service, and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths–in our case, our ability to communicate to a wide range of supporters through the Internet–could also be one of your greatest vulnerabilities.”

    (You can read President Obama’s full remarks at this link.)

    Obama also admitted that thousands of U.S. military systems had been infected with malware through the use of thumb flash drives, and said that enough is enough. To that end, the National Security Council and the Homeland Security Council have been instructed to do a top-to-bottom review of Uncle Sam’s IT security and the information and communications networks on which the country depends for our lives and jobs. And he added that he would be personally picking the new Cybersecurity Coordinator, who will orchestrate IT security for Uncle Sam as well as interfacing with the Office of Management and Budget to make sure security doesn’t get back-burnered when cuts have to be made. The big goal is to get Federal and state governments as well as the public and private companies that run the zillions of nodes on the Internet to provide coordinated countermeasures to attacks on the Internet when they occur.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 21 -- June 1, 2009

    Sponsored by
    ServiceExpress

    Have questions about Power10?

    Join our IBM Champions for a live Q&A on Wednesday, October 4th.

    In this webinar, you get to decide the topic of conversation.

    Our experienced IBM Power Champions are ready to cover all things IBM Power and IBM i. Submit your questions in the chat and we’ll answer them as they come in.

    While your questions submitted in the chat will be our priority, you can expect us to cover:

    • Options for moving to Power10
    • End of Support for Power8
    • End of Service for IBM i 7.3
    • The IBM i and IBM Power roadmap
    • End of support for TS3100 tape libraries

    Register Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    COMMON Europe Needs Your Input on Top i Concerns OpenSpan Aims to Bring Mainframe Qualities to Desktop Integration

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 21

This Issue Sponsored By

    Table of Contents

    • IBM Makes the Case for Power Systems SSDs
    • Server Sales Breakdown Bigtime in the First Quarter
    • COBOL at 50: Same Age as Barbie, But More Like Rodney
    • Why Are Systems Programmers Always To Blame?
    • OCEAN Conference Emphasizes Higher Education, Lower Fees
    • Clarification on IBM’s Power Systems Withdrawals
    • Obama Administration Creates Cyber Czar to Secure IT Infrastructure
    • IBM Sues to Stop Exec from Getting a Dell (Paycheck)
    • Looks Like It Will be i 7 for that Future Release
    • IBM Kicks in $5 Billion in Financing to Chase Stimulus Projects

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • ARCAD’s Deal with IBM for DevOps In Merlin Is Exclusive
    • In The IBM i Trenches With: Maxava
    • Is The Cloud On Your IBM i Horizon?
    • Four Hundred Monitor, September 20
    • IBM i PTF Guide, Volume 25, Number 38
    • The Subscription Pricing For The IBM i Stack So Far
    • Facing The Challenges Of Upgrading Old Systems With The Cloud
    • Guru: Generating XML Using SQL – The Easy Way
    • Rocket Buys Data Integration Provider B.O.S.
    • IBM i PTF Guide, Volume 25, Number 37

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2023 IT Jungle