The Hacker Mind Podcast: Hacking Voting Systems
ForAllSecure
OCTOBER 29, 2020
You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. This includes best practices. But there’s more. I’m thinking right off the top that PII would be a major concern. How are credentials handled?
Let's personalize your content