Blog Posts Tagged with "Obama"

44fa7dab2a22dc03b6a1de4a35b7834a

White House Hires Former Microsoft Exec as Federal CIO

August 12, 2011 Added by:Bill Gerneglia

The White House has named a new Chief Information Officer to succeed Vivek Kundra. Former Microsoft executive Steven VanRoekel, an Obama supporter who attended the inauguration, will become the next Chief Information Officer of the federal government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Politics Trumps Security in Dubious White House Hire

July 19, 2011 Added by:Headlines

Callahan was the ex-Clinton staffer who famously lost thousands of White House e-mails which were under subpoena, and was also dismissed by the Department of Homeland Security after a Congressional investigation determined she lied about her education and experience credentials...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Scriptkiddies Claim Fox News Twitter Account Hack

July 05, 2011 Added by:Headlines

"We will be requesting a detailed investigation from Twitter about how this occurred and measures to prevent future unauthorized access into FoxNews.com accounts," said Jeff Misenti, Fox News Digital's vice president and general manager...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Critics Rip White House Cybersecurity Proposal

June 28, 2011 Added by:Headlines

"Virtually everybody gets breached. If you're going to have these advanced persistent threat guys come after you, they're going to get into your system. If you're going to make that the line, and then you're subject to these name-and-shame penalties, I think that would be a mistake..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fed CIO Vivek Kundra Leaves White House for Harvard

June 16, 2011 Added by:Headlines

"We are planning for a smooth transition, continuing these remarkable gains in changing the way the federal government manages IT and Vivek’s impact on cutting waste and making government work better for the American people will continue to be felt well beyond his departure..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CIA Chief: Cyberattack Could Be Next Pearl Harbor

June 14, 2011 Added by:Headlines

“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems. It is going to take both defensive measures as well as aggressive measures to deal with it..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Kill Switch Option Actively Debated by Senate

May 24, 2011 Added by:Headlines

The debate in the U.S. over legislating an "Internet kill switch" is not one of whether or not to create a mechanism to control Internet access, but one of who will legally exercise the power to limit accessibility and under what circumstances...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Obama's Cybersecurity Plan Gets Lukewarm Reception

May 20, 2011 Added by:Headlines

"Overall, the proposals are disappointing compared with what the president said in his 2009 policy statement... [and] when you look at some sections, it appears to give DHS some broad authorities here that concern us." said Larry Clinton, president of the Internet Security Alliance...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Cybersecurity Chief Philip Reitinger Resigns

May 19, 2011 Added by:Headlines

"Unless people really start to really pay attention to the threat and how we need to drive fundamental change, we're in a world that is going get worse from day to day and month to month and year to year," Reitinger stated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO's Mutual Defense Doctrine Applies to Cyberspace

May 17, 2011 Added by:Headlines

"Cyberspace activities can have effects extending beyond networks; such events may require responses in self-defense. Likewise, interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Delivers Cybersecurity Strategy to Congress

May 12, 2011 Added by:Headlines

“We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system. It could paralyze this country, and I think that's an area we have to pay a lot more attention to..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Outlines Strategy for Trusted Identities in Cyberspace

April 18, 2011 Added by:Headlines

This is NOT a government-mandated, national ID program; in fact, it's not an identity 'program' at all. This is a call by the administration to the private sector to step up, take leadership of this effort and provide the innovation to implement a privacy-enhancing, trusted system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Scores Low on Cybersecurity Report Card

January 25, 2011 Added by:Headlines

The National Security Cyberspace Institute has released a report that examines the White House record on cybersecurity policy over the last two years. The grades earned are mediocre at best, and do not live up to the challenges facing cybersecurity in the wake of Aurora, Stuxnet, and WikiLeaks...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

An Internet ID for Americans

January 22, 2011 Added by:Theresa Payton

An early draft of the plan indicates that the implementation would be handled via the U.S. Commerce Department and not Department of Homeland Security or the National Security Agency. Experts feel this may be in a nod to privacy concerns...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Government to Provide Intelligence on Cyber Threats

January 19, 2011 Added by:Headlines

"I think we all recognize that the government has unique access to information. We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect themselves..."

Comments  (0)

Page « < 1 - 2 - 3 > »