Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President

Hillary Clinton’s private server is currently in the possession of the FBI and she is under investigation for sending and receiving classified information.

At the end of an event in New Hampshire Hillary Clinton was asked about her plans for protecting cyber security.

“It is one of the most important challenges the next president is going to face,” Clinton said. Clinton said that the technology offenses conducted by hostile states have become more advanced. She named Russia, China, Iran, and North Korea as countries that are just going to accelerate their attacks on the cyber infrastructure of the United States.

“We first have to figure how to create what would be an understanding with these nations that we will not tolerate their cyber theft and their cyber evasiveness, and we certainly would never ever sit still for a cyber attack,” Clinton said.

Clinton also spoke of another level of cyber attackers that is made up of terrorist networks and hacker networks who have nothing to lose when they release a cyber attack. Clinton also said the US needs to work on both levels to prevent the attacks from happening and giving them the information that they want.

Clinton is known for having a private server during her time as secretary of state. In October, it was reported that the private server made it more vulnerable to hackers.

Clinton’s private server is currently in the possession of the FBI and she is under investigation for sending and receiving classified information.

In the latest batch of emails released by the State Department, 22 of the emails were designated Top Secret. Clinton denies that when the emails were generated that they contained top-secret information and has demanded the State Department release them to the public.

It has also been reported that during Clinton’s time at the State Department that it was one of the worst agencies in the federal government at protecting its computer networks. The deteriorating situation continued well into when John Kerry took over.

“After setting up an unsecure email server in her basement that exposed highly classified information and triggered an FBI investigation, it goes without saying Hillary Clinton has flunked the cyber security test with flying colors,” a spokesman said.  
FreeBeacon: http://bit.ly/1S1izRm

« Anonymous Hacks Thai and Turkey Police Stations
Women Write Better Computer Code Than Men »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Esentry

Esentry

Esentry systems is a managed security service provider with focus on continuous security monitoring, threat detection, threat analysis and cybersecurity compliance.