January 25, 2017 By Larry Loeb 2 min read

The nonprofit Mozilla Foundation issued its first “Internet Health Report,” detailing notable cybersecurity trends related to hot topics such as government surveillance and the Internet of Things (IoT). The report focused on open innovation, digital inclusion, decentralization, privacy and web literacy on a global scale.

Inside the ‘Internet Health Report’

With the report, Mozilla hopes to popularize the term “internet health” similar to how environmentalists engaged the public with the term “global warming,” Solana Larsen, the editor of the 40-page report, told Threatpost. “We want to work with people and organizations that care about a healthy internet,” she said.

The authors of the report were encouraged by the encryption efforts of companies such as Let’s Encrypt and similar initiatives to democratize what can be a daunting process of issuing encrypted certificates for authentication. They also applauded products such as WhatsApp, which has made secure communications both practical and widely available.

Should the upward trend of government network surveillance continue, the report said, the use of these products should increase accordingly.

Pressuring IoT Manufacturers

The report also examined the increasing threat of malware targeting IoT devices. The authors argued that consumers and organizations must hold manufacturers accountable for embedding security into every stage of the development process. While this effort could increase the cost of IoT products, it would also provide invaluable benefits related to functionality and security.

While this is just the first Mozilla Foundation report, it provides a global narrative for the online ecosystem today. By taking a wide view of the internet as a whole, the authors hope to encourage users to examine more than just one local segment of the system. While local situations can drastically affect local use, the report evaluated how the entire internet functions on a global scale.

The “Internet Health Report” explicitly stated that the internet is a globally connected system — what happens in one segment affects all others. It is a credible first step toward better global cybersecurity practices.

More from

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today