Slapdash setup of Trump website collecting reports of Maricopa County in-person vote irregularities exposed 163,000 voter data records to fraud, via SQL injection.
Some on social media speculated the resolution would be binding or that legislation was imminent. Neither are true. But it's another signal that encryption isn't settled policy in even the ...
I think there are four main trends that will play out in the field of information security in the next 20 years. 1. (2021-2030) A Surge in Demand for
A hacking operation that targeted defense contractors earlier this year was more expansive than first thought, with hackers using never-before-seen malicious tools
In the weeks leading up to the 2020 election, technology firms and the U.S. government took steps to prevent and combat election interference in cyberspace. Nonetheless, there were still a ...
A new report reveals organizations are increasing their adoption of biometric authentication and disallowing SMS as a login method.
A corporate security policy is the cornerstone document of a company’s risk management. Does your business have the appropriate security controls in place to implement the policy, or is the ...
The 2020 election was the biggest test yet of a new approach of pre-emptive action against adversaries trying to hack election infrastructure or wage disinformation campaigns.