Expanding Your Election Security Knowledge
Election security is more than understanding the technology, which on its own can be complex and at times confusing; it also includes understanding how to do things securely at every step of the election process. Many of the concerns during the Midterm Elections were amplified by the atmosphere of uncertainty around potential threats, confusion over…
Keeping Election Security News In Perspective
Very few would argue that recent headlines concerning election security haven’t been alarming. From hacking to voting systems to stolen voter registration data and the deliberate distribution of false candidate information, it’s no wonder people are questioning the integrity of election results. It’s hard to know who or what to believe, and while there is…
Incident Response Planning: Facing the Nightmare to Avoid Real-Life Horror
It’s Halloween, a time to turn our attention to the things that terrify us. In honor of this tradition, consider this creepy scenario: Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest rises and falls. The smooth skin reminds you of your own, only…
What is a Firewall and Why Do You Need One?
You may have heard of firewalls and how they are an essential part of your computer and network cybersecurity strategy. In this post, we describe what a firewall is, why they are essential for cybersecurity, and how to set up and maintain your firewall security system. What is a Firewall? A firewall is a device…
Election Security: Detection and Response
One if by Land, Two if by Sea…Three if by Cyber? What would’ve happened if on that fateful night of Paul Revere’s Ride no one saw the lanterns, or if the watchers completely missed the movement of the British troops? While our Nation’s federal and local officials balance providing insights on cyberthreat activities while assuring…
The Election Security Conversation: Hype or Headlines?
You’ve likely seen the media coverage describing the current state of election security, and if you only read the headlines the news isn’t good. From coverage of teenagers hacking election databases in ten minutes at DefCon Voting Village to hackers’ ability to easily manipulate votes on voting machines, the headlines paint a bleak picture. On…
7 Rules of Cybersecurity Threat Hunting
Threat hunting can and should be a part of your cybersecurity efforts, but the idea of starting a threat hunting and monitoring program can be intimidating. Building a portfolio of threats to watch and determining how to manage the risks they pose to your organization is usually confusing, often misleading and just as often stressful….
Your Incident Response Plan Depends on Knowing Your Attack Vectors
by Brian Engle, CISO Similar to businesses, attackers have goals that they set out to achieve. Depending on the attacker, the goals may vary, but ultimately to accomplish objectives an attacker has to utilize an attack vector to break through defenses. Network defenses and cybersecurity protections are the starting point for closing up potential attack…
DefCon’s Voting Village: Results and Impact
by Monty St John It’s been a few weeks since DefCon took place in Las Vegas, but the buzz from this year’s event can still be heard echoing throughout cybersecurity circles, particularly elections cybersecurity. Hackers were out in full force to try their hand at breaking into election machines through DefCon’s “Voting Village” this…
Election Cybersecurity Funding: How Much Is Enough?
by Brian Engle, CISO It would seem that the debate on the Hill over how much funding is needed for securing elections ended before it began. Congress provided funding in the Omnibus budget bill to the tune of approximately $380 million this spring, an allocation that will be divided proportionately among the states. For most…