Colorado has taken the lead on implementing a critical form of backend vote verification.
The High-Fidelity Adaptive Deception and Emulation System uses cutting-edge deception environments where operators can run sting operations on those trying to break into Sandia National Laboratories’ systems.
Regardless of what did or did not happen in 2016, experts are almost unanimous in their assessment that voting machines are riddled with cybersecurity vulnerabilities.
The Lookout mobile security platform spots phishing attempts in emails, texts, social media posts, apps or websites.
A new blockchain model allows users to temporarily store, summarize or completely remove their transactions from blockchain, while maintaining the ledger's consistency.
Although $400 million has been set aside to address vulnerabilities, it's just a drop in the bucket compared to what states and election security experts say is needed to fix the problem.
With the midterm elections just around the corner, candidates and government officials must take extra care to ensure their communications are secure.
People often think of the dark web as a place where criminals sell drugs or exchange stolen information -- or as a rare section of the internet Google can’t crawl. It’s both, and neither, and much more.
Separate the signal from the noise with this multipart overview of election-security concerns.
With the growing need for cybersecurity experts, the government is missing a chance to take advantage of volunteers and part-time talent, a new report says.