Officials and companies who promote online voting are creating a false sense of security –- and putting the integrity of the election process at risk.
When devices' designs and components are open for public view, downstream customers could verify the security themselves.
To prevent attackers from infiltrating government networks, agencies must secure privileged access, limiting intruders’ ability to move laterally and escalate privileges.
Customs and Border Protection’s biometric entry/exit identification system nabbed two men attempting to cross from Mexico into the U.S. using someone else’s border-crossing cards.
With its ability to secure private information and authorize transactions, blockchain can help restore the public’s confidence in government's digital information management.
States are strengthening their election infrastructure, institutionalizing threat information sharing and implementing software-defined access solutions.
While enterprising attackers target government workers, solutions that combine the best of machine learning with expert human analysis can help stop, block and remediate advanced phishing attacks.
A multipronged effort aims to secure the city by investing in cybersecurity technology, entrepreneurs, a skilled workforce and empowering residents to better protect themselves against threats.
The National Institute of Standards and Technology's latest draft of the RMF advises IT managers to integrate supply chain risk into their overall risk management outlook.
To address elections vulnerabilities, best security practices must be applied across the board – from voter registration systems to tabulation machines.