Donate

Security

Deep Dive: How Healthcare Organizations Practice Privacy and Security
Deep Dive: How Healthcare Organizations Practice Privacy and Security Thumbnail
Security 20 August 2019

Deep Dive: How Healthcare Organizations Practice Privacy and Security

In April, the Online Trust Alliance published the 11th annual Online Trust Audit assessing the security and privacy of...

The Capital One breach was preventable, experts say. Here’s what to do now.
Houston Chronicle Logo
Security 5 August 2019

The Capital One breach was preventable, experts say. Here’s what to do now.

Accessible, Clear, and Appropriate: An Open Letter to Amazon on Privacy Policies
Accessible, Clear, and Appropriate: An Open Letter to Amazon on Privacy Policies Thumbnail
Security 17 July 2019

Accessible, Clear, and Appropriate: An Open Letter to Amazon on Privacy Policies

With great power comes great responsibility. Online marketplaces, such as Amazon, are becoming increasingly common. But can consumers count...

The Internet of Things: Connecting the Dots to Become a Smart Consumer
The Internet of Things: Connecting the Dots to Become a Smart Consumer Thumbnail
Security 12 July 2019

The Internet of Things: Connecting the Dots to Become a Smart Consumer

According to a recent survey conducted by Consumers International and the Internet Society, 63% of consumers think the way...

Internet Society’s Online Trust Alliance Reports Cyber Incidents Cost $45B in 2018
Security 9 July 2019

Internet Society’s Online Trust Alliance Reports Cyber Incidents Cost $45B in 2018

Reston, VA – July 9, 2019 – The Internet Society’s Online Trust Alliance (OTA), which identifies and promotes security and privacy...

2018 Cyber Incident & Breach Trends Report
Security 9 July 2019

2018 Cyber Incident & Breach Trends Report

This year’s report includes ransomware, business email compromise (BEC), distributed denial-of-service (DDoS) attacks, connected device vulnerability, and more.

The Internet Is Your Oyster: MANRS at International Telecoms Week
The Internet Is Your Oyster: MANRS at International Telecoms Week Thumbnail
Security 24 June 2019

The Internet Is Your Oyster: MANRS at International Telecoms Week

What do oysters, clams, and mussels have in common with network operators? Hint: it’s not just that they are...

The Internet Society’s African Chapters Join the African Union and Other Partners to Discuss IoT Security, Privacy, and Digital ID in Africa
The Internet Society’s African Chapters Join the African Union and Other Partners to Discuss IoT Security, Privacy, and Digital ID in Africa Thumbnail
Security 23 April 2019

The Internet Society’s African Chapters Join the African Union and Other Partners to Discuss IoT Security, Privacy, and Digital ID in Africa

In collaboration with the Africa Union Commission (AUC), the Africa Telecommunication Union (ATU), and Omidyar Network, from 8-11 April...

10 Years of Auditing Online Trust – What’s Changed?
10 Years of Auditing Online Trust – What’s Changed? Thumbnail
Security 22 April 2019

10 Years of Auditing Online Trust – What’s Changed?

Last week we released the 10th Online Trust Audit & Honor Roll, which is a comprehensive evaluation of an...

Best Practices: Infrastructure Security
Security 16 April 2019

Best Practices: Infrastructure Security

Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure...

OTA’s Online Trust Audit Scores Consumer-facing U.S. Government Websites Highest in Security and Privacy; Healthcare Comes in Last
Security 16 April 2019

OTA’s Online Trust Audit Scores Consumer-facing U.S. Government Websites Highest in Security and Privacy; Healthcare Comes in Last

“From the global economy to daily individual interactions, more and more of our lives are conducted online. Yet every...

Internet of Things Devices as a DDoS Vector
Internet of Things Devices as a DDoS Vector Thumbnail
Security 11 April 2019

Internet of Things Devices as a DDoS Vector

As adoption of Internet of Things devices increases, so does the number of insecure IoT devices on the network....

Load More