January 25, 2017 By Larry Loeb 2 min read

The nonprofit Mozilla Foundation issued its first “Internet Health Report,” detailing notable cybersecurity trends related to hot topics such as government surveillance and the Internet of Things (IoT). The report focused on open innovation, digital inclusion, decentralization, privacy and web literacy on a global scale.

Inside the ‘Internet Health Report’

With the report, Mozilla hopes to popularize the term “internet health” similar to how environmentalists engaged the public with the term “global warming,” Solana Larsen, the editor of the 40-page report, told Threatpost. “We want to work with people and organizations that care about a healthy internet,” she said.

The authors of the report were encouraged by the encryption efforts of companies such as Let’s Encrypt and similar initiatives to democratize what can be a daunting process of issuing encrypted certificates for authentication. They also applauded products such as WhatsApp, which has made secure communications both practical and widely available.

Should the upward trend of government network surveillance continue, the report said, the use of these products should increase accordingly.

Pressuring IoT Manufacturers

The report also examined the increasing threat of malware targeting IoT devices. The authors argued that consumers and organizations must hold manufacturers accountable for embedding security into every stage of the development process. While this effort could increase the cost of IoT products, it would also provide invaluable benefits related to functionality and security.

While this is just the first Mozilla Foundation report, it provides a global narrative for the online ecosystem today. By taking a wide view of the internet as a whole, the authors hope to encourage users to examine more than just one local segment of the system. While local situations can drastically affect local use, the report evaluated how the entire internet functions on a global scale.

The “Internet Health Report” explicitly stated that the internet is a globally connected system — what happens in one segment affects all others. It is a credible first step toward better global cybersecurity practices.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today