5 Key Takeaways from InterAction’s New Disinformation Toolkit 2.0
Journalist and Nobel Prize laureate Maria Ressa captured the essential nature of the threat that the rising tide of mis- and disinformation poses in her recent...
ICRC Cyber Attack is Our Constituent Data Management Nightmare
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...