Practical Insights on Digital Security

When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

Published on: Apr 21 2018 by Steve Vosloo - Comments Off on When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads
Facebook currently has a Cambridge Analytica problem. It is under severe pressure to explain how 87 million users had their personal data leaked and offer assurances...
4 Digital Security Principles for 2018 to Protect Yourself from a Cybersecurity Nightmare

4 Digital Security Principles for 2018 to Protect Yourself from a Cybersecurity Nightmare

Published on: Feb 05 2018 by Praekelt Org - Comments Off on 4 Digital Security Principles for 2018 to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Published on: Feb 02 2018 by Guest Writer - 2 Comments
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
5 Tools for Secure Communications and Data Storage

5 Tools for Secure Communications and Data Storage

Published on: Jul 27 2016 by Guest Writer - 1 Comment
Many local partner organizations that international development actors engage with face risks while operating in challenging – and sometimes dangerous – environments....
What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...