article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

So if you're talking about electronic voting system, even with just the check in tablet or the actual voting app itself, whether it's a mobile app or if it's a paper system or whatever it might be. There's lots of different ways, maybe it's an old paper counter. They're calling it a blockchain. It's not a true blockchain.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

So if you're talking about electronic voting system, even with just the check in tablet or the actual voting app itself, whether it's a mobile app or if it's a paper system or whatever it might be. There's lots of different ways, maybe it's an old paper counter. They're calling it a blockchain. It's not a true blockchain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

So if you're talking about electronic voting system, even with just the check in tablet or the actual voting app itself, whether it's a mobile app or if it's a paper system or whatever it might be. There's lots of different ways, maybe it's an old paper counter. They're calling it a blockchain. It's not a true blockchain.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

NATO to launch new cyber centre Acknowledging that “cyberspace is contested at all times”, NATO will create a new cyber centre at its military headquarters in Mons, Belgium. James Appathurai, NATO’s deputy assistant secretary general for innovation, hybrid and cyber, said the new centre would be modelled on the UK’s NCSC.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Additionally, the quantity of issues that can arise throughout the data lifecycle would require a longer investigation than the scope of this paper will cover. Note that the volume of cyber guidance available is too large for one article to address all facets comprehensively. Mandatory Access Control. Role-Based Access Control.