As we head into the final days before the 2018 elections, the media coverage of election security has never been greater. Sadly, much of the news is not very encouraging. For example:
Indeed, just this week, Vice President Mike Pence accused the Chinese Government of meddling in the upcoming US elections, although some cybersecurity experts disagree.
The administration’s own secretary of homeland security, Kirstjen Nielsen, said: “We currently have no indication that a foreign adversary intends to disrupt our election infrastructure.
“We know they [the Chinese] have the capability and we know they have the will. So we’re constantly on alert to watch. But what we see with China right now are the influence campaigns, the more traditional, longstanding, holistic influence campaigns,” Nielsen said on Tuesday at a Washington Post cybersecurity conference.
Others are much more concerned with Russian election interference – again.
Brief History on U.S. Election Cybersecurity Coverage
Going back more than two years, this blog covered this election cybersecurity topic from numerous angles. In March of 2016, I was one of the first to ask: “Could the Election Be Hacked?”
On the weekend before the 2016 vote, I wrote, “Trust the Vote: Here’s Why.” [Note: this piece was written when most people thought Hillary Clinton would win.]
After the 2016 election, we discussed views on the trouble with recounts in the name of hacking and later recapped the good, bad and ugly with those vote recounts that did occur.
In January 2017, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/expert-interview-on-2018-election-security-2.html
Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…
Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…
For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…
It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…
1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…
This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…