[ad_1] Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable. Part 2 of a two-part series. The Iowa caucus isn’t the first time that election technology failed spectacularly. As the New York Times reported, a November 2019 election in Northampton County, Pennsylvania, made history by being
[ad_1] In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.
November 5, 2019: In Northampton County, Pennsylvania, a candidate for judge, Abe Kassis, came up with just 164 votes out of 55,000 cast — a statistical absurdity. After hand scanning the ballots from the
[ad_1] Many companies are struggling to get a handle on risk exposure because of visibility issues, Radware survey shows. Many businesses that are transitioning to public cloud environments, microservices architectures, and 5G networks are creating new blind spots in the attack surface for criminals to leverage, according to a new report from Radware. The security
[ad_1] Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It’s time to fight back.
Cybercriminals innovate when necessary, but like any successful enterprise, they also harvest low-hanging fruit wherever they can find it. Targeting older, vulnerable systems that have not been properly secured is not just an effective attack strategy,
[ad_1] As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface. As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. Indeed, myriad innovations have made it easier for people
[ad_1] As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning. As security operations centers (SOCs) continue to evolve, enterprises are challenged with enhancing their ability to detect cyberthreats and keep themselves from harm, according to a recent report about building successful SOCs from the Information Security
[ad_1] The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense. Thanks to technology advances in operational technology (OT) and critical infrastructure, physical and cyber systems can now be combined and leveraged in new ways that were unimaginable just a decade ago. These new capabilities provide the ability
[ad_1] As OT systems increasingly fall into the crosshairs of cyberattackers, aviation-industry CISOs have become hyper-focused on securing them. Finding and fixing vulnerabilities across airport operational technology networks may not be sexy, but the damage and confusion a successful attack can cause is nothing short of sensational. These critical airport systems include baggage control, runway