Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

You are here: SecPoint & IT Security News

Obama Cyber Coordinator Position Created

Observers are now anticipating President Barack Obama's impending announcement of the new position of cyber coordinator (otherwise known as cyber czar, among many other names created by the media) on Friday.

On Thursday, people who are privy to the announcement explain that the cyber coordinator is responsible for organizing the country's attempts to protect private and government networks from the threat of cyber criminals, hackers, virtual terrorists, and Internet-based spies.

According to our sources, the cyber coordinator will answer to both the National Economic Council's Head and the National Security Adviser. However, he will not report directly to the president or be given access within the White House itself. All the same, Obama won't appoint anyone to the post on Friday since the selection procedure is still continuing up until that time.

Our anonymous tipsters also added that the White House

Will issue an accompanying 40-page document that establishes the federal government's mission-vision when it comes to fighting against hacker attacks. However, it does not present any specific details on how to go about improving the state of cyber security in the U.S. Our sources refuse to disclose any more information outside of that up until the document has been released and the president has made his announcement.

Almost immediately after his inauguration, Obama arranged a month-long review of the federal government's initiatives in regards to cyber security regulations within the White House in order to guarantee that they were properly incorporated, applied, and managed within the private sector and congress.

According to what Melissa Hathaway (one of the National Security Council's senior officials and the head of the evaluation proceedings) said in a security conference held near the end of 2008, the cooperation of international coalitions and the public-private organizations' relationship with each other are the keys to finally solving the nation's cyber security troubles. One other senior member remarked that the solution to IT data protection must happen through a concerted team effort that requires a wide-ranging and all-inclusive approach.

Meanwhile, administration executives commented that the representatives of academics, government agencies and departments, the public and private sector, state and local officials, and privacy and civil liberties experts were among the people conferred with during the cyber security review.

The DHS (Department of Homeland Security) estimates that the number of hacker-related assaults on private and federal networks have exponentially increased from about four thousand in 2005 to a monstrous seventy-two thousand just last year.

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef