Digital Security Articles & Newsletters

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 2)

    Guide

    This short module opens with an introduction to the problem space (password reuse), followed by introducing password managers, and optionally having students install one and sign up for an email with a randomized password.PrerequisitesThreat modeling(Good to know) Authentication - Part 1Estimated time20-25 minutes (35-40 minutes …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Threat modeling

    Guide

    Threat modeling is foundational to thinking through security broadly, and we therefore introduce it before several other more technical topics. We first encourage the use of physical metaphors (e.g., choosing how and where to lock a bicycle) before introducing digital applications to help beginners understand how they may already create …

    default social card (URL location fixed)

    Surveillance triage for medical whistleblowers

    Guide

    At the close of 2019 in Wuhan, China, local doctor Li Wenliang began to notice an uptick in patients experiencing flu-like symptoms, many reportedly feeling ill after visiting the Huanan seafood market. Concerned about the possibility of a SARS-like outbreak, he shared his observations with his medical school alumni group …