Practical Insights on Digital Security

Six Ways Technology Solutions Can Help End Gender-Based Violence

Six Ways Technology Solutions Can Help End Gender-Based Violence

Published on: Mar 31 2021 by Guest Writer - 1 Comment
COVID-19 and related containment measures have triggered a shadow pandemic of Gender-Based Violence (GBV). This global scourge threatens the safety and well-being...
What Are User Perceptions of Internet Trust and Privacy in India and Ghana?

What Are User Perceptions of Internet Trust and Privacy in India and Ghana?

Published on: Jul 01 2020 by Kristen Roggemann - Comments Off on What Are User Perceptions of Internet Trust and Privacy in India and Ghana?
It’s been a hard couple of years for the internet. Between election interference via social media platforms, disinformation going viral and facilitating genocides,...
We Need a 10th Principle for Digital Development: Educate the User

We Need a 10th Principle for Digital Development: Educate the User

Published on: Mar 07 2019 by Kristen Roggemann - 3 Comments
We in the international development community talk a lot about privacy and security in digital development. We try to think through privacy and security in terms...
When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

Published on: Apr 21 2018 by Steve Vosloo - Comments Off on When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads
Facebook currently has a Cambridge Analytica problem. It is under severe pressure to explain how 87 million users had their personal data leaked and offer assurances...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

Published on: Feb 05 2018 by Praekelt Org - Comments Off on 4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Published on: Feb 02 2018 by Guest Writer - 2 Comments
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
5 Tools for Secure Communications and Data Storage

5 Tools for Secure Communications and Data Storage

Published on: Jul 27 2016 by Guest Writer - 1 Comment
Many local partner organizations that international development actors engage with face risks while operating in challenging – and sometimes dangerous – environments....
What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...