Journalists Blog
Read the latest insights from the GCA Cybersecurity Toolkit team and our network of partners. Use the filters to sort by toolbox, type and topic.
Read the latest insights from the GCA Cybersecurity Toolkit team and our network of partners. Use the filters to sort by toolbox, type and topic.
Filters:
7/31/2024
Every compromised password is a ticking time bomb,...
6/20/2023
A simple step to protect yourself and your organization...
2/2/2023
The Global Cyber Alliance (GCA), in its mission to...
1/12/2023
I2. IoT devices. DMARC. The first few Global Cyber...
5/18/2022
Unfortunately, a cybersecurity attack does not discriminate...
4/6/2022
Read the latest insights from the GCA Cybersecurity...
3/30/2022
Each of our Cybersecurity Toolkits has specialized...
3/23/2022
We’ll be featuring a series on our toolkit blogs...
2/11/2022
Tools that journalists use in their reporting process...
1/11/2022
In your social circle, friends circulating an obviously...
11/24/2021
How do you know if you’re about to be subject to...
11/18/2021
As a journalist in Africa, it is common to hear of...
9/8/2021
At school, I often spent hours with my friends devising...
7/29/2021
Cloudflare started Project Galileo in 2014 to provide...
7/8/2021
You’re a reporter who’s deeply invested in covering...
5/4/2021
To support World Press Freedom Day, the Global Cyber...
4/6/2021
Imagine you’re a watchdog researcher. For years you’ve...
3/30/2021
Imagine you’re a political reporter during an election...
3/23/2021
Imagine you’re a multimedia journalist covering weeks...
3/16/2021
Imagine you’re a contributor at a major television...
3/9/2021
Imagine you’re an independent reporter embedded in...
3/2/2021
Every writer has, at some point or another, been told...
2/18/2021
Have you ever seen a custodian walk around with a massive...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/