Story image

Cyber hacking lessons from the U.S. election

11 Nov 2016

The meddling of nation state actors (Russia) in the U.S electoral systems and processes was the most serious issue in this controversial election.

Those are the strong words from Avivah Litan, vice president and distinguished analyst at Gartner, who says there are some lessons to be learned around cyber hacking from the recent U.S Elections that saw Donald Trump be elected president.

“I was as stunned as anyone by the U.S election results,” Litan says.

“I also immediately questioned the security of the state election systems.”

Litan says she couldn’t help but wonder why an August 29 story written by well-respected journalist Michael Isikoff that ran on Yahoo News detailing an FBI alert about hacks into state election servers was “ignored by the public and most of the media.”

Back in August, chief investigative correspondent for Yahoo news Isikoff reported the FBI uncovered evidence that foreign hackers penetrated two state election databases, prompting the bureau to warn election officials across the U.S to take new steps to enhance the security of their computer systems.

According to his report, the FBI warning, contained in a “flash” alert from the FBI’s Cyber Division, came amid heightened concerns among U.S. intelligence officials about the possibility of cyberintrusions, potentially by Russian state-sponsored hackers, aimed at disrupting the November elections.

“Surely state and local governments do not have the resources to adequately protect their infrastructure from advanced nation state or other types of hacker attacks,” Litan says.

“Most large well-equipped organisations in this country struggle with the same despite multi-million dollar security budgets spent each year on cybersecurity,” she explains.

“Whatever happened to national plans to protect our nation’s critical infrastructure? I would definitely consider local and state election systems a central component of those critical infrastructure systems,” Litan adds.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.