Research | Our Q3 report details what's new in the world of ransomware.
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Beyond MDR
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Operational Technology
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Threat Hunting
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Threat Intelligence
Find cyber threats that have evaded your defenses.
Model Index
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
Phishing Analyzer
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
Integration Partners
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Blog
Company Blog
Case Studies
Brands of the world trust ReliaQuest to achieve their security goals.
Data Sheets
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
eBooks
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Podcasts
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
Solution Briefs
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
Threat Advisories
The latest threat research report from ReliaQuest Threat Research research team.
White Papers
The latest white papers focused on security operations strategy, technology & insight.
Videos
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
ReliaQuest ResourceCenter
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Threat Research
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
Shadow Talk
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
November 30, 2023
About ReliaQuest
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Leadership
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Careers
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
Contact Us
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
More results...
Contrary to some media reporting, our latest research finds that cyber activity during the 2016 U.S. presidential election does not appear to have demonstrably altered events in the short-term.
For this post, let’s leave aside hacktivism campaigns – such as OpTrump and OpKillary – that have been largely inconsequential (you can read the whitepaper for a detailed analysis). Instead, let’s look at the impact of the activities surrounding Guccifer 2.0, WikiLeaks and DC Leaks on public opinion.
Of course, opinion polls are notoriously volatile, and any attempt to map out fluctuations in electoral support in line with cyber events using available polling data would need to be tentative. Moreover, opinion polls change on a day-to-day basis, and it would be very difficult to accurately quantify whether any increase or drop in support was a direct result of reporting on a cyber event, particularly as we do not know how widely or quickly such information would reach the voting public. Finally, there could be any one of a number of reasons for polling fluctuations, therefore trying to tie individual cyber events to changes in polling numbers would be speculative at best.
Despite this, if we look at Clinton and Trump’s polling statistics over a broader period, certain trends emerge which may, in part, have been influenced by cyber events. The graph below presents polling statistics for Clinton and Trump since July 2015 (the area in blue below the line represents the percentage lead of either candidate). This indicates that Clinton experienced her most sustained period of low polling between mid-May and early August 2016.
Figure 1: Clinton vs Trump polling data from July 2015 to the time of writing (Source: realclearpolitics.com)
Perhaps coincidentally, the reported compromise of the DNC’s network, the emergence of Guccifer 2.0, the leaking of over 19,000 DNC documents by WikiLeaks, and the reported compromise of the DCCC network all occurred between June 14 and July 29 – the period in which Clinton polled the lowest in her entire campaign. The graph below shows an enhanced snapshot of this period, between late May 2016 and the time of writing, along with some of the major events to have occurred during that time.
Figure 2: Clinton vs Trump polling data from May 2016 to the time of writing (Source: realclearpolitics.com)
Clinton’s polling figures actually increased following reports of the DNC network compromise and the series of Guccifer 2.0 leaks, although her support then dropped in late June and remained low until early August 2016. Trump’s polling figures increased following reports of the DNC compromise, and rose steadily as the Guccifer 2.0 and WikiLeaks data leaks came to light. However, following an initial peak after becoming the official nominee for the Republican Party, Trump’s polling figures dropped dramatically.
The polling numbers are far from conclusive, and there could be any number of reasons why support for Clinton remained relatively low throughout July. One potential factor may have been the increased media reporting of the cyber activity involving Guccifer 2.0, DC Leaks, WikiLeaks and the attacks on the DNC. Media reporting about the information included in the data leaks increased, and the Democratic Party experienced added public scrutiny in the lead up and during their party convention. Perhaps significantly, Clinton support dropped noticeably in the immediate aftermath of the public resignation of Debbie Wasserman Schultz on July 28, the chairperson for the DNC. The resignation of Schultz was a direct result of the DNC breach data hosted by WikiLeaks. Likewise, increased scrutiny on Clinton and the Democratic Party may have had a knock on effect on Trump’s polling figures, which appear to have steadily risen in line with the sustained spell of cyber activity. We can therefore make a tentative assessment that the combination of cyber events that occurred between mid-May and late July may have had a cumulative effect on the opinion polls, if only for a temporary period. These assumptions, however, cannot be confirmed.
Regardless, it’s clear that any potential impact of this flurry of cyber activity was short-lived. Following her official nomination, Clinton’s polling numbers increased to pre-May levels – prior to the reported DNC compromise and the subsequent data leaks – and have remained relatively constant since then. Trump, on the other hand, experienced a major drop in support following his official nomination. There are, therefore, limits to any analysis that looks at how significant cyber activity has been in terms of voting patterns. In order to assess this further, respondents would need to be asked specific questions about why they favored a particular candidate over another at a specific time. Future analyses of the impact of cyber activity on elections would, therefore, benefit from having such polling data to draw on.
While recent activity may not have rocked the vote towards a particular candidate, it’s also important to consider the public’s declining confidence in the electoral system. As voters’ faith in the electoral system diminishes, there is a chance that voter turnout could be suppressed – a sentiment that may well be exasperated following Friday’s large-scale DDoS attack on Dyn.