New USAID Guide: Cybersecurity Across the Electoral Process
Since electronic voting technology was first introduced, a variety of new technologies have been developed and integrated into elections around the world, affecting...
Mapping Trends in African Government Internet Freedom Restrictions
Internet freedom in Africa has been on the decline over the past years with several countries continually adopting aggressive and sophisticated measures that...
10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
ICRC Cyber Attack is Our Constituent Data Management Nightmare
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...