article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. This includes best practices. But there’s more. I’m thinking right off the top that PII would be a major concern. How are credentials handled?

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. This includes best practices. But there’s more. I’m thinking right off the top that PII would be a major concern. How are credentials handled?

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. This includes best practices. But there’s more. I’m thinking right off the top that PII would be a major concern. How are credentials handled?

Hacking 40