Practical Insights on Threat Model

5 Key Takeaways from InterAction’s New Disinformation Toolkit 2.0

5 Key Takeaways from InterAction’s New Disinformation Toolkit 2.0

Published on: Feb 09 2022 by Adam Fivenson - Comments Off on 5 Key Takeaways from InterAction’s New Disinformation Toolkit 2.0
  Journalist and Nobel Prize laureate Maria Ressa captured the essential nature of the threat that the rising tide of mis- and disinformation poses in her recent...
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

Published on: Feb 05 2018 by Praekelt Org - Comments Off on 4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Published on: Feb 02 2018 by Guest Writer - 2 Comments
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...