Practical Insights on Cyber Attack

New USAID Guide: Cybersecurity Across the Electoral Process

New USAID Guide: Cybersecurity Across the Electoral Process

Published on: Nov 02 2022 by Wayan Vota - Comments Off on New USAID Guide: Cybersecurity Across the Electoral Process
Since electronic voting technology was first introduced, a variety of new technologies have been developed and integrated into elections around the world, affecting...
10 Ways Cybersecurity Can Improve Digital Development Outcomes

10 Ways Cybersecurity Can Improve Digital Development Outcomes

Published on: Jan 27 2022 by Guest Writer - Comments Off on 10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

Published on: Feb 05 2018 by Praekelt Org - Comments Off on 4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Gender-Violence 2.0: The Digital Safety Gap for Women

Gender-Violence 2.0: The Digital Safety Gap for Women

Published on: Jan 12 2015 by Guest Writer - 3 Comments
Technology not only has the power to connect people, but also the power to reinforce and disseminate social and cultural structures and help normalize gender roles....