Tag: Policy

Estonians have been voting electronically for 13 years. Their secret: a secure, well-engineered national identity system.

Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote

Podcast: Play in new window | Download (Duration: 58:42 — 67.2MB)Subscribe: Android | Email | Google Podcasts | RSSIn this week’s episode of The Security Ledger Podcast (#100 – woot!): Taavi Kotka spent 4 years as the Chief Information officer for the nation of Estonia – whose government is widely recognized as among the most technologically advanced in the world. He talks about the Estonian model for e-governance and how the U.S. has ruined the term “e-voting” for everyone. Also: what happens when discussions about the security of bits and bytes have consequences measured in flesh and blood? Joshua Corman, the Chief Security Officer at the firm PTC joins us to talk about it, ahead of his featured presentation at next week’s Security of Things Forum in Boston.

AggregateIQ, a company at the center of questions about the improper use of Facebook data in targeting voters during the 2016 elections, has received a warning about violations of the EU General Data Privacy Rule.

GDPR is Here: What Now?

Now that the EU General Data Protection Regulation (GDPR) is upon us…what happens now? In this industry perspective, Steve Schlarman of RSA writes that GDPR compliance isn’t a one time affair – the requirements of the law are likely to be woven into the fabric of how businesses operate inside and outside the EU. 

Researcher Robert Xiao found that Location Smart, a free web application, allowed anyone to locate a mobile phone with nothing more than the phone's number.

Episode 97: On eve of GDPR frightening lack of data privacy, security in US

Podcast: Play in new window | Download (Duration: 43:26 — 49.7MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode, #97: we talk with Robert Xiao, the Carnegie Mellon researcher who investigated Location Smart, a free web application that allowed anyone track the location of a mobile phone using just the phone’s number. Also: we welcome University of Washington Researcher Kate Starbird back into the SL studio to talk about her latest research: examining the web of bloggers, news web sites, conspiracy theorists and government actors targeting human rights workers in Syria.

State and local elections officials find themselves on the front line against sophisticated cyber adversaries, says John Dickson of The Denim Group

Episode 96: State Elections Officials on Front Line against Russian Hackers

Podcast: Play in new window | Download (Duration: 41:18 — 47.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the balance. Also: we talk about the looming threat posed by so-called “deep fake” videos that use computer manipulation to make famous celebrities appear to say nearly anything.