Jeff Hussey profile picture

Jeff Hussey

President, CEO and Co-Founder

Friday, March 23, 2018

Each year, it seems as if we are seeing increasingly clever exploits, and hackers are outdoing themselves when infiltrating our critical infrastructure. While compliance requirements have become stronger, trends point to the fact that they are not stopping these advanced attacks that hackers throw our way.

Unfortunately, we’re all witness to these exploits on a daily basis, and we’re all suffering the consequences. Over a year after the US Presidential election, the hack-related buzz is still surrounding our nation’s voting systems. Voting technology is vulnerable and becomes even more so as legacy systems get older and older. In order to maintain and protect one of our most cherished rights as citizens, we need State governments to be prepared and proactive in defending networks and voting systems against cyber breaches. With the midterm elections looming around the corner, many wonder what can be done – a topic addressed in this Huffington Post article. In the article, Huffington Post editor, Jennifer Gomes, cites the ability to ‘cloak’ voting machines ‘so that bad actors cannot find them’ and potentially manipulate the outcome of our elections.

That’s where Tempered Networks comes in.

We offer Identity Defined Networking (IDN) that cloaks or hides networked devices and systems. Even if a hacker had all of a user’s login names and passwords for the targeted voting system, they could not breach the voting overlay network, since device trust is based on a unique cryptographic identity. The hacker would not even be able to see the voting system. You can’t hack what you can’t see.

Our mission is to help protect critical infrastructure like the voting systems in question. We are committed to helping government agencies who are managing these systems, as well as other sensitive networks, that may be seen as huge targets for cyber attacks.

The founding fathers didn’t want our nation’s decisions to be made by someone overseas, so why should we? 

So if you’re interested in protecting voting systems and outsmarting the hackers, contact us and we will gladly help you.