The Hacker Mind Podcast: Hacking Voting Systems
ForAllSecure
OCTOBER 29, 2020
You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. Things like newer technologies like botching as well as biometrics. This includes best practices. But there’s more. How are credentials handled?
Let's personalize your content