FOSTER CITY, Calif., July 11, 2019 /PRNewswire/ -- The Federal Election Commission (FEC) ruled today on the outstanding issue of whether cybersecurity companies can offer cybersecurity technology to 2020 U.S. presidential campaigns based on business-as-usual, low-cost pricing offered to all qualified customers. The following comments on that decision may be attributed to Armen Najarian, Chief Marketing Officer, Agari, which is the recognizable leader in cybersecurity solutions specifically focused on the next-generation Secure Email Cloud.
See where top candidates rank on email security. View the Agari 2020 Presidential Election Email Threat Index.
The Federal Election Commission (FEC) settled a long-standing debate about how private companies can help protect the 2020 U.S. presidential election cycle from nation-state attackers and other advanced email threats. Our democracy is founded on the right to vote and for the citizens to choose our elected officials. Today's decision ensures the next President of the United States will be decided by the voters, not cyber criminals or nation-state influencers. It is our full expectation that the cyber attacks against the 2020 U.S. presidential candidates will be more aggressive than we've seen before, because these attackers continue to move away from content-based techniques and towards identity-based attacks, which many cybersecurity technologies cannot detect. The Clinton campaign fell victim to a brand impersonation phishing attack that many people believe influenced the outcome of the 2016 presidential election. We have been very involved in educating the 2020 campaigns on how to prepare for advanced email protection that, ultimately, will defend the integrity of the U.S. presidential election and ensure humanity prevails over evil.
CONTACT: Jean Creech Avent, (770) 862-7978, firstname.lastname@example.org
View original content to download multimedia:http://www.prnewswire.com/news-releases/fec-rules-on-us-presidential-campaign-cybersecurity-technology-issue-300883915.html