Voatz Delivers Multilayered Security to Protect Electronic Voting

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.

Terry Sweeney, Contributing Editor

August 5, 2020

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Filmed for the Dark Reading News Desk at Black Hat Virtual. For complete schedule of News Desk schedule, see DarkReading.com/DRnewsdesk.

For more information, download this whitepaper, State-of-the-Art Security Performs First-Rate Threat Mitigation in Convention Elections.

This paper leverages the security datasets from the Voatz remote voting system while conducting historic virtual conventions in April 2020. This analysis of the rich dataset reflects the platform's multi-layered device and network level threat detection and mitigation mechanisms performing in the real-world and in real-time, It also offers insight and implications for the applicability of mobile security for voting and other high-stakes industries.

Authors: Philip Andreae, Advisor, Voatz; Hilary Braseth, Chief of Staff, Voatz; Nimit Sawhney, Co-founder, and CEO, Voatz

Related content:

 

Read more about:

Black Hat News

About the Author

Terry Sweeney

Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights