Trump Offers A Cyber Security Warning

President-elect Donald Trump has weighed in on IT security, suggesting that the best way to keep secrets from hackers is a huge air gap.

"No computer is safe," he told journalists gathered at his Mar-A-Lago resort in Florida, a warning many computer security professionals would probably endorse.

Trump also shared his advice on managing data security risks. Forget switching to TLS or quantum key exchange: "If you have something really important, write it out and have it delivered by courier," he said, according to a report from Associated Press.

Trump's suggestion, echoing his July 29 Infosec advice for military commanders, would put the biggest of airgaps around secret communications, ensuring that they could not be hacked into from afar. If he were to apply it to government communications, though, it would leave officials needing a veritable army of trustworthy little hands to carry messages.

The security, or otherwise, of email servers was a hot topic during the presidential election campaign, with Trump making much of opponent Hilary Clinton's use of a private server to host official government emails during her time as Secretary of State, and even encouraging Russian hackers to try to find emails she had deleted.

Despite this encouragement, Trump has been dismissive of allegations that Russia attempted to influence the election through hacking.

When US President Obama announced sanctions against Russia over attempts to hack the Democratic National Committee, Trump told reporters: "I think we ought to get on with our lives."

Trump has arranged to meet with US intelligence officials to discuss the allegations, and said at the New Year's Eve event, that he wants US them "to be sure because it's a pretty serious charge."

Such allegations can be difficult to substantiate, he warned.

"I know a lot about hacking," he said, "And hacking is a very hard thing to prove, so it could be somebody else."

Computerworld:                Nonstop Cyber Attack - Israel Builds Hack-Proof Defense:
 

« New Age of Digital Farming
CIOs Are Neglecting Process & Most Efficient Options »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

National Association of Software and Services Companies (NASSCOM)

National Association of Software and Services Companies (NASSCOM)

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.