Feeds

MS security chief becomes DHS cybersecurity boss

Hot seat

Internet Security Threat Report 2014

A senior Microsoft exec has been placed in charge of protecting the US's computer systems from hacking attacks

Philip Reitinge, chief trustworthy infrastructure strategist at Microsoft, has been appointed to the lead role in protecting the US government's computing network from from cyberattack. He was tapped by US Homeland Security Secretary Janet Napolitano. The role is formally described as deputy undersecretary for the DHS's National Protection and Programs Directorate.

Reitinger previously served as the executive director of the Defense Department's Cyber Crime Center, which supplies computer forensics and investigation services to the US military. He's also worked in the Department of Justice, as deputy chief of the Computer Crime and Intellectual Property division

The appointment follows a week after Rod Beckstrom, director of the DHS National Cybersecurity Center, quit citing his opposition at what he described as the National Security Agency's increased role in cybersecurity. Reitinge will assume charge of running the centre, according to reports. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.