• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Exclusive

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

An hour in the Oval Office with President Trump.

Commentary

What the DNC Hack Says About the U.S. Government’s Cybersecurity Strategy

By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
By
Rajiv Gupta
Rajiv Gupta
Down Arrow Button Icon
July 28, 2016, 3:01 PM ET
2016 Democratic National Convention
A fan with Hillary's picture on it appears as the crowd reacts to President Bill Clinton as he speaks about his wife Hillary Rodham Clinton on the second night of the Democratic National Convention on Monday, July 26, 2016.Photograph by Carolyn Cole — Los Angeles Times

Rajiv Gupta is CEO of Skyhigh Networks, a California-based cloud security and enablement company. The companies and agencies listed in this article are not clients of Skyhigh Networks.

As if the US presidential election needed any more drama, evidence is mounting that Russian officials recently hacked the Democratic National Committee ahead of this week’s convention in Philadelphia. While the threat of espionage between nations has loomed for years, the timing and substance of the DNC leak suggests Russian intention to influence a US presidential election.

The hack sets a new precedent and draws into question the US government’s ability to deter state-sponsored cyberattacks on even the most sensitive government and political operations. In the absence of diplomatic enforcement, the DNC breach is another reminder that government agencies and non-profit organizations need to proactively prepare for hacking attempts from professional, sophisticated adversaries.

Over the years, political campaigns have become vulnerable to cyber attacks. Campaigns gather research on rival candidates, which results in valuable stockpiles of intelligence on political leaders. The gray area around international cybercrime has given foreign governments the audacity to carry out their own Watergate-style thefts. Barack Obama and John McCain’s campaigns both suffered data breaches from Chinese hackers in 2008.

What stands out in the latest breach is the length and extent of the compromise: So far, we know that attackers accessed all email and chat traffic for nearly a year. Remaining undetected within a confidential system for so long requires a high level of sophistication and discipline. When the hack came to light with the breach of Donald Trump’s files, experts knew the attackers had much more information. Now the DNC is accusing Russia of attempting to use the stolen information to influence the US election – a far graver charge than the standard intelligence gathering.

It’s clear that the threat of an attack on the DNC was inevitable. So, why wasn’t the campaign prepared for a cyber attack? The odds are stacked against a relatively small organization like the DNC. Groups like the organization tied to the DNC breach are highly organized, determined, and well-funded. The target on the backs of government and political organizations coupled with limited security budgets poses an uphill battle to agency security teams.

The natural solution would seem to involve targeting the attacks at their source – foreign government authorities. Unfortunately, for domestic organizations, the US’s own cyber espionage likely limits its efficacy in negotiations to curb attacks. Officials did report success in reducing Chinese state-sponsored attacks on the US private sector, but this is an area where the US government has little to gain from offensive action. Furthermore, attribution is always a grey area for enforcing punishment for cyber attacks, even in the presence of substantial evidence.

As a result, the frequency of attacks on government targets is only increasing. Obama’s latest comprehensive cybersecurity plan requires the government to release an annual audit report. This spring’s report documented a 10% increase in cybersecurity incidents at US government agencies for a total of 77,183 (page 14). Even the most locked down government agencies struggled with state-sponsored hacking. In June, the US Federal Reserve released information on more than 50 data breaches from the past four years. Malicious code, the same category of the infiltration into the DNC’s systems, represented the most common type of incident. The Federal government as a whole suffered 7,466 successful malicious code attacks in the past year (page 17).

Without hardline diplomatic support on the cyber attack problem, government agencies and political organizations need to assume they are targets. One account called the attack on a political infrastructure a compromise of “our civic infrastructure.” Europe has taken an important first step in protecting valuable national assets: A new EU directive will establish required cyber security standards for organizations that provide essential services.

The current status quo has left national political secrets vulnerable to foreign exploitation. One limitation of government cybersecurity has been excessive conservatism around security technology. In an era of constantly evolving threats, keeping ahead of hackers requires adopting the latest emerging technologies. Political organizations operate on the cutting edge of data analytics and marketing technology. Why shouldn’t the same innovation carry over to cybersecurity?

Fortunately, current US technology leadership has recognized the crisis and taken unprecedented steps in modernizing US technology infrastructure. The first step has been to recognize the risk of outdated systems in use. The US Federal Chief Information Officer Tony Scott reports $3 billion of government IT equipment and services will become obsolete in the next three years. Scott is a huge proponent of replacing legacy technology with more modern and secure cloud software; federal cloud use has increased 15.8 percent in the past year. In a telling gesture, Obama appointed security executives from Microsoft and Uber to his panel for enhancing national cybersecurity. The Department of Defense conducted the first-ever “Hack the Pentagon” bug bounty program in which “white hat”, or ethical hackers, get paid to report vulnerabilities in the agency’s systems. The program found over 100 vulnerabilities and earned praise from Defense Secretary Ashton Carter.

Even a year ago, steps like moving data to the cloud and opening up the DoD’s network to friendly hackers might have seemed inconceivable. Major breaches and sustained attacks have forced evolution on how government agencies secure their systems. The DNC reportedly received alerts of compromise months before they sought comprehensive help. The alleged violation of our electoral system might not immediately change US policy on cyber espionage, but it will certainly change the way organizations approach and respond to the immediate threat.

About the Author
By Rajiv Gupta
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

shyam
CommentaryHealth
World Economic Forum: women’s health gets only 20% of R&D funding. We must seize this $1 trillion opportunity
By Shyam BishenMay 18, 2026
5 hours ago
murdochs
CommentaryMedia
OpenAI paid $100 million for a talk show. James Murdoch is eyeing an even bigger deal. The hot new asset class is humanity
By Lin CherryMay 17, 2026
20 hours ago
dennis
CommentaryAI agents
Freshworks CEO: why agile enterprises are winning the AI race — and what they did differently
By Dennis WoodsideMay 17, 2026
20 hours ago
Mary Moreland-Abbott Executive Vice President of Human Resources.
CommentaryRetirement
Gen X is the most indebted generation in America. Their employers can fix that
By Mary MorelandMay 17, 2026
22 hours ago
liberman
Commentarystart-ups
We watched social media concentrate. The same thing is happening in AI, only at a deeper layer
By David Liberman and Daniil LibermanMay 16, 2026
2 days ago
olivier
CommentaryAnthropic
I’ve been studying Big Tech for a long time. What just happened with Anthropic and the Pentagon terrifies me
By Olivier SylvainMay 16, 2026
2 days ago

Most Popular

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
AI
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
By Jake AngeloMay 16, 2026
2 days ago
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
Economy
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
By Jason MaMay 17, 2026
15 hours ago
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
6 days ago
'No one was coming to save me': How Reese Witherspoon built a $900 million company from a problem Hollywood wouldn't fix
Success
'No one was coming to save me': How Reese Witherspoon built a $900 million company from a problem Hollywood wouldn't fix
By Sydney LakeMay 17, 2026
22 hours ago
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
Politics
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
By Jason MaMay 16, 2026
1 day ago
SpaceX heads into a record-shattering IPO with the 'deepest moat that exists today' as investors vow to 'never bet against Elon'
Innovation
SpaceX heads into a record-shattering IPO with the 'deepest moat that exists today' as investors vow to 'never bet against Elon'
By Jason MaMay 16, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.