The WIRED Guide to Digital Security: From Passwords to Faraday Cages
Guide that asks you to determine what your data profile is, and then provides a number of articles and tips for the types of steps you should be taking based on your data profile. Read more here.
You might also like
-
Community listening: A relational, people-first process that shouldn’t be turned into a tickbox exercise
-
Meet us in person at ICT4D Conference in Nairobi in May 20-22
-
Kicking off a new learning group: AI and MERL in Latin America
-
Event Recap: Evaluating the Climate & Socio-Environmental Impact of Data Centers
