Russian General Brags About Cyberwar Successes

A serious threat against the electoral system may be Russian hackers. Two years ago, top Russian General Valery Gerasimov, (pictured) who has president Vladimir Putin’s ear, called for a new kind of warfare.

In a military journal, Gerasimov wrote of using covert and propaganda tactics to turn a “perfectly thriving state” into a victim of “foreign intervention” causing it to “sink into a web of chaos".

Adam Meyers, the head of intelligence for the cyber security firm CrowdStrike, said Gerasimov’s doctrine is behind the recent hacks of election databases and the Democratic National Committee. “...Imagine if, on election night, reports come out that cause people to think that the results of the election are questionable,” said Meyers. Meyers and US government officials fear that’s exactly what the Russians will try to do.

“All they need to do is call into question the results that come back from one district, one state. And that might cause such a reaction that they call for a complete recount,” said Meyers.

Helen Purcell, the elections recorder for Maricopa County, Arizona, said an easy way to stop the hackers, is to keep the voting machines offline.

“We use paper ballots, so even on our touch screen machines, you have a tape of everything that happens on that machine so that can be verified later,” Purcell said.

US Officials have accused the Russians of using similar tactics in other countries, including Ukraine during its 2014 presidential election.

While the Russians have denied the allegations, CBS News is told US President Obama is considering retaliating with sanctions or a cyber-attack.

CBS:          Russia’s ‘New’ Tools for Confronting the West. Continuity and Innovation in Moscow’s Exercise of Power:

« The Internet Shutdown In Ethiopia
So Far In 2016 Data Breaches Are Up 20% »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Concentric AI

Concentric AI

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.