U.S Elections and the Coming Cyber Wars

Hillary Clinton is the leading US Democratic Party candidate. That means if US primaries were on tomorrow, Clinton would win. And she would be running for President next year. But things might be about to change…

As a former US Secretary of State it’s fair to say she has some pretty strong connections in the US government. She is also a former First Lady.

Thus it’s fair to say she has access to a fair bit of top-secret information. As a person in her position, digital security is very important. And in a typical case the Department of Homeland Security (DHS) would give a person in such a position a ‘secure’ email server. Well that’s not the case for Clinton. In fact her choice of email server could swing the US primaries. And in turn impact the 2016 US Presidential elections. Who would have thought an email server could be so important? And who would have thought her decision would create some of the best investment opportunities of the 21st century? 

An email server affecting a presidential race, but the FBI is looking into Hillary Clinton, and not in a good way. Her email set up at home is ‘unusual’ according to government officials.

She doesn’t use the typical government email set up. Instead she has a private account set up by a Denver-based company.
And this is now under question due to one big factor, the security of her email. Remember, Clinton is privy to top-secret information. And the government is worried about the security of said information.

They like control and right now with Clinton, they don’t have it. Let’s me ask you something. Assume you had to choose between two email set-ups. Your decision is solely based on the security that email will provide. Nothing else. One is an email that a national security government agency sets up for you. The other is an email server set up by a private technology company.

Which do you choose? It sounds like a straightforward answer right? You’d go with the government one. Wouldn’t you? Surely they would have the highest level of security? Well…maybe not.

Ein News:

 

 

« Malaysia: Umno members told to go on ‘cyber war’
Predictive Policing Technology Arrests »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.