U.S Elections and the Coming Cyber Wars

Hillary Clinton is the leading US Democratic Party candidate. That means if US primaries were on tomorrow, Clinton would win. And she would be running for President next year. But things might be about to change…

As a former US Secretary of State it’s fair to say she has some pretty strong connections in the US government. She is also a former First Lady.

Thus it’s fair to say she has access to a fair bit of top-secret information. As a person in her position, digital security is very important. And in a typical case the Department of Homeland Security (DHS) would give a person in such a position a ‘secure’ email server. Well that’s not the case for Clinton. In fact her choice of email server could swing the US primaries. And in turn impact the 2016 US Presidential elections. Who would have thought an email server could be so important? And who would have thought her decision would create some of the best investment opportunities of the 21st century? 

An email server affecting a presidential race, but the FBI is looking into Hillary Clinton, and not in a good way. Her email set up at home is ‘unusual’ according to government officials.

She doesn’t use the typical government email set up. Instead she has a private account set up by a Denver-based company.
And this is now under question due to one big factor, the security of her email. Remember, Clinton is privy to top-secret information. And the government is worried about the security of said information.

They like control and right now with Clinton, they don’t have it. Let’s me ask you something. Assume you had to choose between two email set-ups. Your decision is solely based on the security that email will provide. Nothing else. One is an email that a national security government agency sets up for you. The other is an email server set up by a private technology company.

Which do you choose? It sounds like a straightforward answer right? You’d go with the government one. Wouldn’t you? Surely they would have the highest level of security? Well…maybe not.

Ein News:

 

 

« Malaysia: Umno members told to go on ‘cyber war’
Predictive Policing Technology Arrests »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

WideField Security

WideField Security

WideField Security a venture backed cybersecurity startup helps enterprise protect their identity attack surface.

Parrot Security (ParrotSec)

Parrot Security (ParrotSec)

Parrot Security provides a huge arsenal of tools, utilities and libraries that IT and security professionals can use to test and assess the security of their assets.