Cybersecurity Policy
Threat Modeling: Methodologies, Myths, and Missing Perspectives
Author(s):
Hilary MacMillan, EVP for Engineering, CyLogic
On April 10, 2014, citizens of Ghaziabad, a city near Delhi, India, cast their ballots for parliamentary elections using electronic voting machines. The machines – and the votes they held – had to be stored in a secure location for a month, until vote counting was set to begin. When planning, election officials accounted for … Read more