More Cybersecurity Articles
Although the security updates to the Election Assistance Commission's new Voluntary Voting System Guidelines 2.0 are sorely needed, the approval and updating process can't keep up with technological changes.
By transforming the mobile platform into a self-contained, privacy-protecting authentication machine, local identity verification can be practical and secure.
The inevitable blending of traditional warfare and cyber warfare will pose intellectual and regulatory challenges that will get more complicated as technology develops.
As the Senate warned against potential threats to 5G security from Chinese companies, the Trump administration issued an executive order declaring foreign supply chain threats to the U.S. telecommunications system a national emergency.
Federal preemption of state laws would mean states could no longer respond to privacy threats, and consumers could only turn to Congress for a remedy.
Additional resources would help the Election Assistance Commission with its expanded election security activities, EAC Chair Christy McCormick told Congress.
A new ProPublica investigation found two U.S. data recovery firms that claimed to help unlock data but actually paid the ransom and marked up their costs to the victims.
E-pollbook software made by VR Systems "catastrophically" failed on Election Day 2016 in a number of Durham County, N.C., voting precincts where voters ended up being turned away.
To better secure the defense industrial base, the Pentagon wants to publish its list of software companies it doesn't trust.
Applying negotiation tactics to ransomware attacks can help organizations manipulate the situation before, during and after an attack.
Sign up for our newsletter.