Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President

Hillary Clinton’s private server is currently in the possession of the FBI and she is under investigation for sending and receiving classified information.

At the end of an event in New Hampshire Hillary Clinton was asked about her plans for protecting cyber security.

“It is one of the most important challenges the next president is going to face,” Clinton said. Clinton said that the technology offenses conducted by hostile states have become more advanced. She named Russia, China, Iran, and North Korea as countries that are just going to accelerate their attacks on the cyber infrastructure of the United States.

“We first have to figure how to create what would be an understanding with these nations that we will not tolerate their cyber theft and their cyber evasiveness, and we certainly would never ever sit still for a cyber attack,” Clinton said.

Clinton also spoke of another level of cyber attackers that is made up of terrorist networks and hacker networks who have nothing to lose when they release a cyber attack. Clinton also said the US needs to work on both levels to prevent the attacks from happening and giving them the information that they want.

Clinton is known for having a private server during her time as secretary of state. In October, it was reported that the private server made it more vulnerable to hackers.

Clinton’s private server is currently in the possession of the FBI and she is under investigation for sending and receiving classified information.

In the latest batch of emails released by the State Department, 22 of the emails were designated Top Secret. Clinton denies that when the emails were generated that they contained top-secret information and has demanded the State Department release them to the public.

It has also been reported that during Clinton’s time at the State Department that it was one of the worst agencies in the federal government at protecting its computer networks. The deteriorating situation continued well into when John Kerry took over.

“After setting up an unsecure email server in her basement that exposed highly classified information and triggered an FBI investigation, it goes without saying Hillary Clinton has flunked the cyber security test with flying colors,” a spokesman said.  
FreeBeacon: http://bit.ly/1S1izRm

« Anonymous Hacks Thai and Turkey Police Stations
Women Write Better Computer Code Than Men »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

Kodem

Kodem

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.