Venafi conducted of a study on the security of our election infrastructure.
“Last year, attendees at DEF CON managed to find and take advantage of vulnerabilities in five different voting machine types within 24 hours. While these findings were disturbing, conference attendees only examined a small portion of our election infrastructure. It’s clear to nearly all security professionals that the back-end systems that transmit, aggregate, tabulate, validate and store election data at least as vulnerable to cyber attacks as voting machines.”
--- Jeff Hudson, CEO of Venafi.
Venafi's study was conducted by Dimensional Research in July 2018 and includes responses from 411 IT security professionals in the U.S., U.K. and Australia.
“Security professionals clearly think that machine-to-machine communication in the electoral process is a high value asset for attackers targeting election results. This is just one reason why governments around the world need to make the security of all encrypted, machine-to-machine communication their top concern.”
--- Kevin Bocek, vice president of security strategy and threat intelligence for Venafi