Red, Hack, and Blue: The Evolution of Election Cyber Threats

Four years is practically a lifetime when it comes to the rapid evolution of cyber threats. This year’s U.S. Presidential Election has been subject to an unprecedented number of attacks from some of the most sophisticated and mysterious hackers ever seen. Are we headed toward a future where bad actors are successfully able to manipulate democracy?

Get a free subscription to Zero Day Magazine and read the full article to learn more about how previous elections were subjected to unprecedented new information security risks.

Let us hear from you.

We encourage our readers to engage in an ongoing discussion of the latest security developments. Keep the conversation going by emailing us your thoughts and questions on the latest issue. Does the fact that political candidates and political parties have been hacked influence your choice on election day? Or does your overall political motivation overshadow any technical challenges that a political candidate may face? Would you abstain from voting over cyber security concerns? Do you think a cyber attack could sabotage a US election in the future? Let us know by emailing your comments to zeroday@alertlogic.com.

Zero Day Magazine is a digital publication, powered by Alert Logic.® Zero Day Magazine provides a broader view of the current state of IT security, vulnerabilities, and cloud security trends. Every quarter, we deliver news, analysis, and commentary on the security challenges that industries face.

Read Now

About the Author

Paul Fletcher - Cyber Security Evangelist at Alert Logic

Paul Fletcher

Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executives in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).

@_PaulFletcher | More Posts by Paul Fletcher