Showing 7 ideas for tag "cybersecurity"

Open Data

A Need for a Defensive Network First

On March 10, 2021, Eric Goldstein, the executive assistant director for cybersecurity at CISA, told members of the House Appropriations Subcommittee on Homeland Security about the four areas the CISA will focus on with the additional $650 million from the 2021 American Rescue Plan.

With all due respect, Eric Goldstein's priorities are out of order. The first priority is the defense of our network with zero trust principles.... more »

Voting

0 votes
0 up votes
0 down votes
Active

Open Data

A National Cybersecurity Innovation Contest is badly needed

Businesses, academia, the military, private citizens and their grandmas just won't stop complaining that cybercriminals are continuously innovating and always a step ahead (recently the bad actors just had some fun changing the FireEye name to BlackEye). The problem is that the disdain for independent innovation in this country is off the charts ...

I have a number of intellectual properties (www.danmimis.com) including... more »

Voting

0 votes
0 up votes
0 down votes
Active

Open Data

Cybersecurity innovation

I am the creator of TUPLEZZ, which is a very powerful (probably the most powerful) method and system for strong authentication and secure communication designed to keep cybercriminals at bay for now and in the soon-to-come age of quantum computers.

Imagine a hacker who installed a RAT (Remote Access Trojan/ Remote Administration Tool) on Alice's PC and so he can see everything (screen captures and keylogging) that happens... more »

Voting

0 votes
0 up votes
0 down votes
Active

Election Security

Redesign the basic computer to make it Malware Secure

The development of a New Class of Computer Components has enabled the design of Malware Secure Computers which does not need to use detection software, encryption or analytics (AI), in order to allow for Malware safe internet, email and user data file interchange. This would allow for the Malware safe transmission and receiving of election results without those computers being compromised with a Malware. This new technology... more »

Voting

0 votes
0 up votes
0 down votes
Active

Election Security

Voting System overhaul with high security

We all know how third world countries have manipulated Paper Voting Systems - that includes Mail In Voting.

Here's my proposal for a much more secure Voting System!!!

Here's my proposal of the Blockchain Voting System to moving our voting system closer to true Democracy & CAN BE DONE FROM HOME!

Between Republican Gerrymandering, Voter Suppression, Voter IDs & Voter Registration suspensions along with their move to... more »

Voting

0 votes
1 up votes
1 down votes
Active

Open Data

Cybersecurity through Job Security

There are too many people with high skills in technology and personal experience in technology that have a difficult time finding and even hearing from a job(or even internship). Many of these people might be discouraged out of trying to find one and at the same time remain interested in the field. Even worse, there is an attempt to encourage more social people to join technology and discourage people who like to work... more »

Voting

1 vote
1 up votes
0 down votes
Active