backtop


Print 37 comment(s) - last by noxipoo.. on Jun 15 at 12:17 PM


Microsoft security chief Scott Charney is a leading candidate for the cybersecurity czar position, created by President Obama.  (Source: Microsoft)
President Obama will soon pick a candidate to lead our nation's cybersecurity efforts

Cybercrime, particularly attacks from foreign sources, is on the rise.  In the past month, many government systems and systems of government contractors have been penetrated by hackers from China or elsewhere.  Meanwhile petty cybercrime also remains a problem with malware, phishing, and botnets a lucrative business for some cyber-criminals.

Past exercises have shown the U.S. to have weak cyber-defenses, largely because of poor coordination between the organizations tasked with our government's security.  President George W. Bush and his successor President Barack Obama have set out to improve on this situation by allocating money to security and creating a new cybersecurity czar position to organize the fight.

Two leading candidates have emerged for this job.  The first is Scott Charney, head of Microsoft's cybersecurity division.  According to a source close to Mr. Charney, Mr. Charney says he won't take the job, however, the source believes that he would change his mind if pressed.  In the past Mr. Charney lead PricewaterhouseCoopers' cybercrime unit and before that he worked for the Justice Department's computer crime section.

The leading alternative is Paul Kurtz.  Mr. Kurtz served on the National Security Council under both President Clinton and President Bush.  He was a member of President Obama's transition team leading the cybersecurity efforts.

There are also a handful of other candidates that stand a shot.  Rep. Tom Davis, a moderate Virginia Republican; Sun Microsystems executive Susan Landau; Maureen Baginski, a veteran of the National Security Agency and Federal Bureau of Investigation; Frank Kramer, an assistant defense secretary under Clinton; Melissa Hathaway, who led a cybersecurity review for the president; and James Lewis of the Center for Strategic and International Studies think tank, are all under consideration, says a source.

John Thompson, chairman of the board of Symantec Corp. who had previously been considered a front runner turned the position down.

One thing that adds to the difficulty of the efforts is that the exact role of the job and its authority (and jurisdiction) remains undefined.

Some candidates have already begun to criticize each other.  Mr. Lewis struck out at the corporate candidates, commenting, "Some guy from industry is going to write a national security strategy? No, they aren't. You don't just pick this up.  You need somebody who knows the national security game, who knows government and who knows about the technology."



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Bad choices
By theapparition on 6/15/2009 8:13:30 AM , Rating: 2
This issue here is two-fold.

What the OP was refering to was desktop, or standard computer use. And he was absolutely correct that most installations are on Windows.

The sector you are talking about falls into embedded computing. While aircraft systems may certainly run a very customized and stripped down version of *nix, external security threats to them are virtually non-existant since they don't offer the connectivity and interfaces that would necessitate a security threat.

So why techically a large deployment, your argument fails logic because those systems are generally isolated. The biggest security threat to those sytems is from foreign entities gaining access to source code. However, once deployed, there is not much that can affect embedded software (if it's designed right).


"Nowadays, security guys break the Mac every single day. Every single day, they come out with a total exploit, your machine can be taken over totally. I dare anybody to do that once a month on the Windows machine." -- Bill Gates














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki