Feb 22, 2020 | Attack Vectors, Best Practices, Cyber Liability, Cybercrime, Cybersecurity, Elections, Government, Hackers, Hacking, Internet, logging, Malware, Mobile, Mobile Phones, Online Voting, Politics, Privacy, Radio Show, Radio_Show, Security, Security, Technology, Tracking, Voting Apps, Voting Technology, Vulnerabilities
Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible. WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...
Feb 15, 2020 | Access Controls, Applications, Attack Vectors, Audit Logs, audit logs, automation, Business, Compliance, credentials, Cyber breaches, Data, data sharing, Elections, Elections, Government, Internet, Intricate Data Systems, Malware, News, Online Voting, Patching, Privacy, Radio Show, Radio_Show, Security, Security Alerts, Technology, Updates, Voting Apps, Voting Technology
The security mistakes made by the Iowa Democratic Party in creating their App Last week there was a caucus in Iowa. Caucuses by their very nature are prone to manipulation and miscounting. Then you add in the fact that the party chose to use a new technology that was...
Nov 9, 2019 | anonymity, Applications, Audit Logs, audit logs, automation, Big Tech, Business, Cloud Vendors, Code-Breaking, Computers, Consumer, credentials, Cyber breaches, Data, Data Storage, Databases, Elections, Elections, Encryption, Government, Hackers, Hacking, Hard Disks, Internet, Legal, Machine Learning, Malware, Nationstates, Networking, Online Voting, Organized Crime, Patching, Radio Show, Radio_Show, Security, Security Alerts, Software As A Service, Technology, Updates, Voting Technology
Online Voting is a Disaster waiting to Happen If it is connected it can be hacked. The risk of only digital data that can not be audited is just a sure way to assure meddling and hacking of our elections. The integrity of our elections must remain paramount if...