Artwork stating 'Education Destroys Barriers', 'We Demand Treatment', and 'I Need A Chance'

Search Results

You searched for: -

There are 15 results  for your search.  View and Refine Your Search Terms

  • This Nigerian media outlet pushes for justice around banking issues

    The Foundation for Investigative Journalism was founded in 2020 to promote and provide accountability in society and advocate for justice on behalf of victims of Nigeria's faltering banking system. The outlet runs a news impact desk, where people can submit complaints of bank fraud or mismanagement directly; then FIJ requests evidence from the aggrieved parties, conducts reviews and fact-checking. The outlet handles 10-20 cases a month, and has facilitated the recovery of over $150,000 for aggrieved individuals since its founding.

    Read More

  • Inside Democrats' efforts to fight election security threats

    The Democratic National Committee (DNC) built up its digital defenses, successfully protecting the 2018 midterm election from the cyber-hacking that occurred in 2016. The DNC now trains staff to spot cyber threats, conducts simulated phishing campaigns to test employees’ vigilance, and security staffers regularly meet with their House and Senate campaign counterparts to offer their security expertise. The DNC also requires protections, such as two-factor authentication, which requires a temporary code in addition to a user’s password and conducts regular “spot checks” of Democrats’ cybersecurity practices.

    Read More

  • Here's how officials are keeping votes secure on Election Day

    North Carolina takes a multipronged approach to election security. Unique serial numbers on mail-in ballots allow the voter to be removed from the system once they are processed. Hundreds of thousands of test ballots are run through voting machines and audited for accuracy. Polling sites are observed by bipartisan poll watchers and trained officials and voting machines are never connected to the internet. Paper receipts are securely stored in case of a recount or audit. Results are stored on encrypted data sticks and locked in high-security facilities operated by state and county boards of elections.

    Read More

  • These groups try to hack the vote – so that real criminals can't

    Cyber security simulations are taking place across the country to help everyone, from government officials to journalists, to identify election-related cyber threats and coordinated disinformation campaigns and make plans to strengthen defenses against them. One company, Cybereason, holds simulation events, sometimes bringing together law enforcement officers from agencies including the Secret Service and FBI, to think through potential security threats and come up with corresponding solutions. Running through security breach simulations helps plan for a quick response to deal with the challenges.

    Read More

  • Cybersecurity 2020: What Estonia knows about thwarting Russians

    Estonia is bolstering its cybersecurity against Russian would-be hackers on a shoestring budget and a brigade of volunteers, called the "nerd reserves." Hailing from Estonia's rich IT community, as well as other industries like education and law, the volunteers engage in a range of defensive activities like planning elaborate simulated cyberexercises and giving talks at elementary schools.

    Read More

  • Coaxing Cops To Tackle Cybercrime? There's An App For That

    Training more local police officers in the latest cybercrime tactics poses daunting obstacles. But a pilot project by New York Police Department found the next best alternative: teaching cops how to collect the information an expert will need to solve complex crimes involving the use of technology. Their Cyber Investigative Standards phone app walks an investigating officer through the questions to ask. The experiment showed NYPD that such crimes are indeed more local than assumed, and more solvable if tackled diligently and quickly.

    Read More

  • Chandler's Basha HS training Arizona's next generation of cybersecurity techs

    At Basha High School in Chandler, Arizona, students can learn about one of the world's fastest-growing professional fields: cybersecurity. The high school works in partnership with the University of Arizona to teach students everything from hardware to software in the program's own dedicated building. Students who complete the program can earn up to 70 college credits and six different certifications.

    Read More

  • A cybersecurity worker shortage in Colorado has the industry tapping veterans to fill the gap

    The Cybersecurity industry in Colorado has started recruiting and training veterans, finding that ex-military members gave what it takes to combat digital "bad guys" and other cybersecurity issues. While Colorado has fewer individuals employed by the cybersecurity industry than the majority of the country, they're finding success with their veteran training programs.

    Read More

  • A.I. Joins the Campaign Against Sex Trafficking

    Online buyers of sex now have a great chance of running into the NYPD's latest initiative to combat trafficking amongst prostitution: a chatbot called Freedom Signal. Originated by an organization called Seattle Against Slavery, this bot collects solicitors' phone numbers and warns them of arrest, as well as using strategically-placed ads and text conversations with real trafficking survivors. The bot is 1,200% more productive than a full-time staff, 10 times more effective than on-the-street outreach, is currently being used in 13 cities, and makes buyers 50-80% less likely to be caught a second time.

    Read More

  • Who's protecting the Internet? Five guys at a nonprofit

    By collecting and sharing its data on Internet scams and phishing attacks, the Anti-Phishing Working Group (APWG), a cyber security nonprofit, acts like a clearinghouse for records. The APWG brings together other international partners, such as companies, universities, governments, and other nonprofits to use its data to develop new strategies to product Internet users against malware and phishing attacks.

    Read More