We Need Strong Information Security Practices in Afghanistan Right Now
The situation in Afghanistan is heartbreaking for everyone. Those who are there, those with family there, and those with friends, colleagues, and care for our fellow...
4 Ways Civil Society Can Improve Digital Security Practices
Over the past two decades, journalists and activists have become dependent on the internet and digital platforms for communications, organisation, and the amplification...
Six Ways Technology Solutions Can Help End Gender-Based Violence
COVID-19 and related containment measures have triggered a shadow pandemic of Gender-Based Violence (GBV). This global scourge threatens the safety and well-being...
What Are User Perceptions of Internet Trust and Privacy in India and Ghana?
It’s been a hard couple of years for the internet. Between election interference via social media platforms, disinformation going viral and facilitating genocides,...
We Need a 10th Principle for Digital Development: Educate the User
We in the international development community talk a lot about privacy and security in digital development. We try to think through privacy and security in terms...
When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads
Facebook currently has a Cambridge Analytica problem. It is under severe pressure to explain how 87 million users had their personal data leaked and offer assurances...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
5 Tools for Secure Communications and Data Storage
Many local partner organizations that international development actors engage with face risks while operating in challenging – and sometimes dangerous – environments....
What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...