This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Keywords: » voting security

Items Tagged with 'voting security'

ARTICLES

voting election

It’s time to modernize the voting process

Josh horwitz enzoic
Josh Horwitz
December 15, 2020

We live in a digital age, yet voting remains woefully outdated. The nation’s recent experience holding a presidential election during a pandemic highlights how important it is to modernize the voting process. The benefits of transitioning to online voting are numerous, including easier access as voters would no longer be required to wait in long lines and greater efficiency as votes would be tabulated electronically. 


Read More
James Woolsey talks to Security magazine about election security and electromagnetic pulses

5 minutes with James Woolsey – On securing U.S. voting systems now and into the future

Maggie shein
Maggie Shein
November 3, 2020
Former Central Intelligence Agency (CIA) Director R. James Woolsey Jr., a veteran of four presidential administrations and one of the nation’s leading intelligence experts, believes we should be worried about election security on a number of levels — though he says there are some relatively easy fixes. Woolsey discusses security threats surrounding the voting process, measures that can be put in place to mitigate those risks, as well as the biggest security threat to the U.S. outside of election security.
Read More
Can the U.S. election be hacked? Well yes it can but not in the way you think.

Could the U.S. Presidential election be hacked?

Moore tyler 17f4640626
Tyler Moore
October 30, 2020
The answer is yes, but the how may be different than you think.
Read More
election

MIT Researchers: Voatz, Voting App, Can Be Hacked

February 17, 2020
New research published by the Massachusetts Institute of Technology uncovered security vulnerabilities in a mobile voting application that was used during the 2018 midterm elections in West Virginia.
Read More
voting

CISA Partners With Cutting-Edge Election Security Auditing Tool Ahead of 2020 Election

December 2, 2019
The Cybersecurity and Infrastructure Security Agency (CISA) is teaming up with election officials and private sector partners to develop and pilot an open source post-election auditing tool ahead of the 2020 elections.
Read More
Voting2

You Cast Your Vote…Or Did You?

Desot
Tom DeSot
October 18, 2019

Of late, much has been written regarding the dangers of electronic voting machines and how their security controls are either lacking or non-existent, leading to potential voter fraud or changes in how ballots are cast


Read More
voting

Report: More Federal Funding is Needed to Secure 2020 Elections

July 18, 2019

The $380 million of Federal funds allocated to election security is not sufficient, and additional Federal support will be needed to secure the 2020 election, says a new report.


Read More
New Newswire Feature Image 3/8/2012

On Election Day, Security Risks Loom

November 6, 2012

Some security experts think there could still be some problems today on election day -- some lost or misattributed votes could go completely undetected.


Read More
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

2023 Top cyber security leaders

Security's 2023 Top Cybersecurity Leaders

Empty conference room

Cyber risk is a business risk

CT scanner

Cybersecurity threats to medical devices are a growing concern

laptop phone.jpg

31% of organizations had users fall for phishing attack

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing