6 Insights on African National Data Protection and Security Practices
The Africa Privacy Report encapsulates the outcomes of research endeavors conducted by the Lawyers Hub, focusing on the dynamic landscape of privacy and data protection...
Authoritarians Attack Human Rights Activist Satellite Technology
Access to space technologies during the Ukraine invasion has been a crucial aspect of the conflict, from providing communications which are resilient to attacks...
4 Quantum Computing Opportunities for African Countries
Artificial intelligence has aided technological innovation as digitalised data continued to grow, and thus many economies depended on its applications in...
New USAID Guide: Cybersecurity Across the Electoral Process
Since electronic voting technology was first introduced, a variety of new technologies have been developed and integrated into elections around the world, affecting...
10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
ICRC Cyber Attack is Our Constituent Data Management Nightmare
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Gender-Violence 2.0: The Digital Safety Gap for Women
Technology not only has the power to connect people, but also the power to reinforce and disseminate social and cultural structures and help normalize gender roles....