Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

Black Hat 2018: 10 Execs On The Top Cybersecurity Threat America Faces Around The 2018 Midterm Elections

CRN asks 10 security executives and technical leaders attending Black Hat 2018 what election-related threats should be most worrisome to the government and general public.

Back 1 ... 4   5   6   7   8   ... 11 Next
photo

Manipulation Of Voting Machines

The collection of voting data is difficult to orchestrate and secure given its decentralized nature as well as the use of different technology in different places, according to Chad Holmes, Optiv's executive vice president, chief services and operations officer.

Voting machines can be manipulated in a manner similar to ATMs if a bad actor has direct access, Holmes said, and securing the infrastructure or network these machines connect with can be challenging. Physical access is the easiest way hackers can be disruptive since many poll workers know little to nothing about cybersecurity, according to Incident Response Practice Director Jeff Wichman.

Jurisdiction with quality analytics or data lake sophistication on the back end, though, should be able to figure out what's going on, detect the anomalies, and isolate the compromised voting machine fairly quickly, according to Holmes.

 
 
Back 1 ... 4   5   6   7   8   ... 11 Next

sponsored resources