Russian General Brags About Cyberwar Successes

A serious threat against the electoral system may be Russian hackers. Two years ago, top Russian General Valery Gerasimov, (pictured) who has president Vladimir Putin’s ear, called for a new kind of warfare.

In a military journal, Gerasimov wrote of using covert and propaganda tactics to turn a “perfectly thriving state” into a victim of “foreign intervention” causing it to “sink into a web of chaos".

Adam Meyers, the head of intelligence for the cyber security firm CrowdStrike, said Gerasimov’s doctrine is behind the recent hacks of election databases and the Democratic National Committee. “...Imagine if, on election night, reports come out that cause people to think that the results of the election are questionable,” said Meyers. Meyers and US government officials fear that’s exactly what the Russians will try to do.

“All they need to do is call into question the results that come back from one district, one state. And that might cause such a reaction that they call for a complete recount,” said Meyers.

Helen Purcell, the elections recorder for Maricopa County, Arizona, said an easy way to stop the hackers, is to keep the voting machines offline.

“We use paper ballots, so even on our touch screen machines, you have a tape of everything that happens on that machine so that can be verified later,” Purcell said.

US Officials have accused the Russians of using similar tactics in other countries, including Ukraine during its 2014 presidential election.

While the Russians have denied the allegations, CBS News is told US President Obama is considering retaliating with sanctions or a cyber-attack.

CBS:          Russia’s ‘New’ Tools for Confronting the West. Continuity and Innovation in Moscow’s Exercise of Power:

« The Internet Shutdown In Ethiopia
So Far In 2016 Data Breaches Are Up 20% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.