U.S Elections and the Coming Cyber Wars

Hillary Clinton is the leading US Democratic Party candidate. That means if US primaries were on tomorrow, Clinton would win. And she would be running for President next year. But things might be about to change…

As a former US Secretary of State it’s fair to say she has some pretty strong connections in the US government. She is also a former First Lady.

Thus it’s fair to say she has access to a fair bit of top-secret information. As a person in her position, digital security is very important. And in a typical case the Department of Homeland Security (DHS) would give a person in such a position a ‘secure’ email server. Well that’s not the case for Clinton. In fact her choice of email server could swing the US primaries. And in turn impact the 2016 US Presidential elections. Who would have thought an email server could be so important? And who would have thought her decision would create some of the best investment opportunities of the 21st century? 

An email server affecting a presidential race, but the FBI is looking into Hillary Clinton, and not in a good way. Her email set up at home is ‘unusual’ according to government officials.

She doesn’t use the typical government email set up. Instead she has a private account set up by a Denver-based company.
And this is now under question due to one big factor, the security of her email. Remember, Clinton is privy to top-secret information. And the government is worried about the security of said information.

They like control and right now with Clinton, they don’t have it. Let’s me ask you something. Assume you had to choose between two email set-ups. Your decision is solely based on the security that email will provide. Nothing else. One is an email that a national security government agency sets up for you. The other is an email server set up by a private technology company.

Which do you choose? It sounds like a straightforward answer right? You’d go with the government one. Wouldn’t you? Surely they would have the highest level of security? Well…maybe not.

Ein News:

 

 

« Malaysia: Umno members told to go on ‘cyber war’
Predictive Policing Technology Arrests »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Cleafy

Cleafy

Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity at scale.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.