Artwork stating 'Education Destroys Barriers', 'We Demand Treatment', and 'I Need A Chance'

Search Results

You searched for: -

There are 11 results  for your search.  View and Refine Your Search Terms

  • Election security a success, but more improvements needed, experts say

    To bolster the security of the 2022 midterm election, officials released frequent alerts and updates about disinformation, cyber threats, and potential physical threats to election workers. A special task force investigated threats against election officials and brought forward four federal cases and several state prosecutions related to the incidents.

    Read More

  • On Election Day, Facebook and Twitter Did Better by Making Their Products Worse

    Facebook, Twitter, and other social media sites defended against election-related disinformation campaigns by quickly identifying and removing fake accounts and putting labels and warnings on posts that made false claims of voter fraud and premature claims of victory. Instead of frictionless usability, they slowed or shut down core parts of their products such as limiting political ads, tweaking recommendation algorithms, and/or preventing sharing and comments on questionable posts. Threats will continue in the weeks ahead, but the companies have prevented widespread disinformation campaigns so far.

    Read More

  • Inside Democrats' efforts to fight election security threats

    The Democratic National Committee (DNC) built up its digital defenses, successfully protecting the 2018 midterm election from the cyber-hacking that occurred in 2016. The DNC now trains staff to spot cyber threats, conducts simulated phishing campaigns to test employees’ vigilance, and security staffers regularly meet with their House and Senate campaign counterparts to offer their security expertise. The DNC also requires protections, such as two-factor authentication, which requires a temporary code in addition to a user’s password and conducts regular “spot checks” of Democrats’ cybersecurity practices.

    Read More

  • These groups try to hack the vote – so that real criminals can't

    Cyber security simulations are taking place across the country to help everyone, from government officials to journalists, to identify election-related cyber threats and coordinated disinformation campaigns and make plans to strengthen defenses against them. One company, Cybereason, holds simulation events, sometimes bringing together law enforcement officers from agencies including the Secret Service and FBI, to think through potential security threats and come up with corresponding solutions. Running through security breach simulations helps plan for a quick response to deal with the challenges.

    Read More

  • Students on lockdown create a global guide to coronavirus conspiracy theories, fake cures, and other whopping lies

    Princeton University's Empirical Studies of Conflict Project launched a tracking effort to document COVID-19 disinformation worldwide. Created by a network of students tapping into fact-checking sites and other social media and internet sources, the data set taking shape (and, with more than 800 entries in its first three months, already accessible online) serves as a resource for researchers, historians, journalists, and the public in the battle against rumors, conspiracy theories, fake cures, propaganda, and other disinformation surrounding the pandemic.

    Read More

  • Iowa Election Snafu: What Happens When IT And Cybersecurity Best Practices Are Ignored

    The wireless application that malfunctioned during the Iowa caucuses highlighted lessons that election officials must apply in future caucuses. The app skipped or was deficient in most of the established best practices for developing software systems. Software should meet minimum privacy and security standards and it should be tested for functionality and security, with access to regular maintenance as needed. Officials should understand the importance of the best practices and standards when making IT decisions and regular testing to identify vulnerabilities, which are promptly addressed, should take place.

    Read More

  • Cybersecurity 2020: What Estonia knows about thwarting Russians

    Estonia is bolstering its cybersecurity against Russian would-be hackers on a shoestring budget and a brigade of volunteers, called the "nerd reserves." Hailing from Estonia's rich IT community, as well as other industries like education and law, the volunteers engage in a range of defensive activities like planning elaborate simulated cyberexercises and giving talks at elementary schools.

    Read More

  • Chandler's Basha HS training Arizona's next generation of cybersecurity techs

    At Basha High School in Chandler, Arizona, students can learn about one of the world's fastest-growing professional fields: cybersecurity. The high school works in partnership with the University of Arizona to teach students everything from hardware to software in the program's own dedicated building. Students who complete the program can earn up to 70 college credits and six different certifications.

    Read More

  • A cybersecurity worker shortage in Colorado has the industry tapping veterans to fill the gap

    The Cybersecurity industry in Colorado has started recruiting and training veterans, finding that ex-military members gave what it takes to combat digital "bad guys" and other cybersecurity issues. While Colorado has fewer individuals employed by the cybersecurity industry than the majority of the country, they're finding success with their veteran training programs.

    Read More

  • Is Blockchain Technology the Future of Voting?

    During West Virginia’s primary elections, a pilot program used blockchain technology and a mobile app to record votes. The aim was to improve election security and make it easier for Americans abroad to cast their ballots. Critics say that the program left many security issues unsolved.

    Read More