We are now in an age where security can breached with just a simple push of a button. With today’s technological breakthroughs come an increasing demand for a more well-rounded and tightened cybersecurity. The tools required to protect each individual from cyber-attacks and threats has also proven that more technical expertise is now more than just a necessity, but of great significance as well.
RSA Conference will be held at Moscone Center in in San Francisco, …
Tozny recently participated in the Global City Teams Challenge Super Action Cluster Summit with a focus on the security and privacy of connected vehicles.
Feb 01, 2017 to Feb 02, 2017
12:30 pm — C123/124
Lunch Keynote: Data Protection, Privacy and Security, and Smart Cities
This panel will discuss transportation cybersecurity issues within a Smart Cities framework with an emphasis on privacy, trust, and identity, and EV charging, storage, …
Greg Stromire provided a great list of privacy protections you can take before participating in direct action as a part of his recent Data Privacy for Activists workshop. Because your mobile device is likely to be one of the most obvious ways of breaching your privacy, many of these are about protecting you mobile device.
This past weekend, one of our great engineers, Greg Stromire hosted a workshop entitled“Data Privacy for Activists” here in Portland. The twenty-five very curious audience members dug into topics like: password practices; easy VPN use; encrypted email; protecting your mobile device.
With how relevant this workshop was in the current environment, we thought we would post the top take-aways that Greg presented so everyone could benefit from his presentation.