Practical Insights on Cybersecurity

What Happened? WorldCoin Crypto ID is Suspended in Kenya

What Happened? WorldCoin Crypto ID is Suspended in Kenya

Published on: Aug 04 2023 by Wayan Vota - Comments Off on What Happened? WorldCoin Crypto ID is Suspended in Kenya
WorldCoin is an open-source digital identification protocol that aims to democratize participation in the global economy. At its heart is a novel concept, World...
Authoritarians Attack Human Rights Activist Satellite Technology

Authoritarians Attack Human Rights Activist Satellite Technology

Published on: May 24 2023 by Guest Writer - Comments Off on Authoritarians Attack Human Rights Activist Satellite Technology
Access to space technologies during the Ukraine invasion has been a crucial aspect of the conflict, from providing communications which are resilient to attacks...
3 Ways USAID Cybersecurity Team is Improving Resilience

3 Ways USAID Cybersecurity Team is Improving Resilience

Published on: Feb 08 2023 by Guest Writer - 1 Comment
In January 2022, an unprecedented data breach rocked the international humanitarian community. The personal information of over 500,000 International Committee...
4 Quantum Computing Opportunities for African Countries

4 Quantum Computing Opportunities for African Countries

Published on: Jan 25 2023 by Wayan Vota - Comments Off on 4 Quantum Computing Opportunities for African Countries
  Artificial intelligence has aided technological innovation as digitalised data continued to grow, and thus many economies depended on its applications in...
Applying US Blueprint for an AI Bill of Rights to African Countries

Applying US Blueprint for an AI Bill of Rights to African Countries

Published on: Dec 08 2022 by Guest Writer - Comments Off on Applying US Blueprint for an AI Bill of Rights to African Countries
Regulation of artificial intelligence is the need of the hour. The release of The Blueprint for An AI Bill of Rights (AIBoR) by the US White House Office of Science...
New USAID Guide: Cybersecurity Across the Electoral Process

New USAID Guide: Cybersecurity Across the Electoral Process

Published on: Nov 02 2022 by Wayan Vota - Comments Off on New USAID Guide: Cybersecurity Across the Electoral Process
Since electronic voting technology was first introduced, a variety of new technologies have been developed and integrated into elections around the world, affecting...
Mapping Trends in African Government Internet Freedom Restrictions

Mapping Trends in African Government Internet Freedom Restrictions

Published on: Mar 16 2022 by Guest Writer - Comments Off on Mapping Trends in African Government Internet Freedom Restrictions
Internet freedom in Africa has been on the decline over the past years with several countries continually adopting aggressive and sophisticated measures that...
10 Ways Cybersecurity Can Improve Digital Development Outcomes

10 Ways Cybersecurity Can Improve Digital Development Outcomes

Published on: Jan 27 2022 by Guest Writer - Comments Off on 10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
New USAID Cybersecurity Primer for Digital Development Programs

New USAID Cybersecurity Primer for Digital Development Programs

Published on: Nov 18 2021 by Guest Writer - Comments Off on New USAID Cybersecurity Primer for Digital Development Programs
The USAID Cybersecurity Primer introduces the concept of cybersecurity as a development challenge, presents opportunities to integrate cybersecurity in programming,...