The Latest in IT Security

Posts Tagged ‘voting’

The good news is that we know how to solve this problem. We need to audit computers by manually examining randomly selected paper ballots and comparing the results to machine results. Audits require a voter-verified paper ballot, which the voter inspects to confirm that his or her selections have been correctly and indelibly recorded. Since […]

Read more ...

16
Aug
2016

As recent events with the Democratic National Committee (DNC) being hacked solidify the fact that we cannot seem to secure anything connected to the Internet, one has to wonder if elections can also be hacked. The topic of “Hacking the Vote” reminds me of one of my favorite InfoSec security maxims; “high technology is often […]

Read more ...

As recent events with the Democratic National Committee (DNC) being hacked solidify the fact that we cannot seem to secure anything connected to the Internet, one has to wonder if elections can also be hacked. The topic of “Hacking the Vote” reminds me of one of my favorite InfoSec security maxims; “high technology is often […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments