Skip to main content

Obama Orders Cyber Security Review

Obama Orders Cyber Security Review

President Obama has given orders for an immediate review of government IT systems, which often have more vulnerabilities than people imagine – and that could mean billions in contracts to secure the infrastructure.

The review will be led by Melissa Hathaway, former Cyber coordination Executive to the Director of National Intelligence. She’s already set up online security for different US intelligence services.

Assistant to the President for Counterterrorism and Homeland Security John Brennan said:

"The national security and economic health of the United States depend on the security, stability, and integrity of our Nation’s cyberspace, both in the public and private sectors."

“The President is confident that we can protect our nation’s critical cyber infrastructure while at the same time adhering to the rule of law and safeguarding privacy rights and civil liberties.”

It was only in November that a Congressional panel warned that China was stealing information from US computer networks, and the following month a Commission on Cybersecurity report stated:

"Cybersecurity is now one of the major national security problems facing the United States."

That work will be needed is inevitable, and that’s what excites the private companies, as there will be billions of dollars in contracts going up for tender – a very juicy apple in a tight economy.

Editors' Recommendations

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
How to create disposable email addresses

Fighting spam is an uphill battle. Each time you unsubscribe yourself from a junk email list, your inbox gets hit with double the amount the next day. What’s worse is not knowing how you got on that list in the first place.

While spam seems inevitable, you don’t have to put up with it anymore. We’re going to tell you everything you need to know about creating a disposable email address, which can help reduce junk mail flow.
Use the Gmail customized emails trick
Although Google doesn't have its own disposable email service, Gmail offers the ability to create customized emails that you can then throw away when you don't need them anymore. If Google's own ad features aren't taking care of the problem, here's how to use this tool.

Read more
Tesla factories’ security cameras caught up in wider hack
Tesla Gigafactory

A Silicon Valley startup offering cloud-based security camera services has had its systems breached in an attack that gave hackers access to numerous live feeds, some of them coming from Tesla factories.

Verkada, which launched in 2016, had around 150,000 of its cameras hacked, with many of the devices installed in hospitals, schools, police departments, prisons, and companies that besides Tesla also included software provider Cloudflare, according to a Bloomberg report on Tuesday, March 9.

Read more
How to secure your Wi-Fi network
man wearing wireless earbuds

Given how much valuable information we entrust to computers these days, it's more important than ever to ensure that your work and home networks are safe. All it takes is one chink in your Wi-Fi's armor to compromise your system, leading to ransomware, invasion of privacy, and the loss of invaluable personal data. Learn how to secure your Wi-Fi network today, and rest easier knowing you've prevented future outrages.
Why do I need to secure my Wi-Fi network?

Wi-Fi works by broadcasting the signal from your modem via a wireless router up to several hundred feet away, allowing any compatible device to connect to the internet. While this is undoubtedly a major convenience for both work and home networks, it also raises the unpleasant possibility that a cybercriminal could compromise the network and gain access to your devices and information. Should any crime be committed using your PC, such as spamming or harassment, the investigation would lead back to your computer, potentially putting you at legal risk.

Read more