Q&A: The myths and realities of hacking an election

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Oct 05, 2016
Featured Image

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack an election? Maybe, but that depends on your goals. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Q&A: The myths and realities of hacking an election
Up To $50 off Various Amazon Kindle Models, Limited Time Discount for Prime Members Only - Deal Alert
War stories: the vulnerability scanning argument
Security for your collaborative software
7 ways DevOps benefits CISOs and their security programs
Are you ready to make the move to public cloud securely to leverage its benefits?
ICYMI: 6 expert tips to better secure third-party network access

eBook: Kony Inc

3 Must-Read Mobile Innovation Stories

Today, the world runs on mobile-time. The speed, access and connectivity to conduct business on any device, anywhere is an enterprise-wide opportunity. Read More

Thumbnail Image

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More

Thumbnail Image
DealPost

Up To $50 off Various Amazon Kindle Models, Limited Time Discount for Prime Members Only - Deal Alert

If you're an Amazon Prime member, or have an active 30-day free trial, you'll get up to $50 off various popular Kindle e-readers for a limited time. Read More

Thumbnail Image

War stories: the vulnerability scanning argument

Read More

Thumbnail Image
INSIDER

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights. Read More

Thumbnail Image

7 ways DevOps benefits CISOs and their security programs

Many organizations are regularly pushing out tens if not hundreds of releases and updates on a daily basis. With help and guidance from the security team, organizations can push secure releases on the first try and save lots of money and time along the way. Read More

Thumbnail Image

Are you ready to make the move to public cloud securely to leverage its benefits?

In the next wave of digital transformation, cloud computing can provide huge benefits to enterprises as compute cost goes down to drive down the cost of IT for organizations. At the same time, cloud features such as agility, scalability and flexibility can benefit attackers who could utilize IaaS for malware distribution. Read More

Thumbnail Image

ICYMI: 6 expert tips to better secure third-party network access

Survey shows that enterprises are not worrying enough about outside access to their networks. Read More

White Paper: AppNeta

3 Reasons Why Network Ops Needs to Focus on Application Performance

IT/Network Ops teams need to build out an application performance team to measure and monitor the end-user experience of the business critical apps these organizations use every day. Read More

Top 5 Stories

1. Here are the 61 passwords that powered the Mirai IoT botnet
2. These ransomware tricks fool the most hardened security pro
3. Five tips for protecting your brand on social media
4. Android malware that can infiltrate corporate networks is spreading
5. Investment fund loses $6 million in BEC scam, suspends operations

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.