InnoVault Customer Profile – Jack

Over the next several weeks, we want to introduce you to some of the key customers of our new product,  Jack is a senior backend engineer with a large enterprise software firm. He has a lot of experience working with secure systems and takes the time to guarantee data privacy is considered throughout the various steps of his long release …

Tozny Launches InnoVault – Encryption Toolkit For Developers

We are proud to announce the release of our latest product, InnoVault – a toolkit that enables developers building websites, apps, and other software to easily embed end-to-end encryption for data security and privacy. 2016 saw a 40% increase in data breaches over 2015, and the team here at Tozny decided we wanted to do something about it. InnoVault is our …

Tozny at HCSS

Tozny’s CEO, Isaac Potoczny-Jones, will be presenting at the High Confidence Software and Systems Conference (HCSS) on May 9, 2017.  Come learn about NIST’s Risk Management Framework and how you can apply it to your work.  And if you happen to be out in Annapolis, meet up with Isaac at the conference! @SyntaxPolice Applying NIST’s New Privacy Risk Management Framework …

End-to-End Crypto Tools

These end-to-end encryption tools help protect your data by ensuring only the parties at either end of the communication can read or use the message. They are a first step to ensuring your data and messages remain safe and secure.

End-to-End Crypto: Secrets

End-to-end encryption is for more than just long-lived data. Sometimes the data that needs protecting is a simple, short string. Like secrets and passwords.

End-to-End Crypto: Secure Email

This week we look at two options for secure email: PGP and S/MIME. We also take a deep dive into a service provider that helps make secure messaging both possible and easy for end users.

End-to-End Crypto: File Storage

End-to-end encryption is just as much about securing messages in transit from point A to B as it is securing data at rest in a file system between permitted times of access.

End-to-End Crypto: Messaging and Chat

There are many end-to-end encrypted messaging systems available for secure, mobile communication. Each has its own advantages and disadvantages; understanding the way each works will help you decide which is right for you.