End-to-end encryption – Why HTTPS is not enough

Apple has gotten a lot of kudos in the security community lately about their approach to end-to-end encryption. WhatsApp and Signal have gotten headlines in years past. Tozny offers end-to-end encryption toolkits for developers, and we often get asked why you should end-to-end encrypt data when HTTPS is pretty secure. This article is part of our Security Guide series –  …

Tozny at php[world]

Eric Mann, from Tozny’s engineering team, will be presenting two talks at 2017’s php[world] conference in Washington, D.C the week of November 15th.

Tozny at SOFWERX

Our CEO, Isaac Potoczny-Jones, will be exhibiting at SOFWERX’s Cyber Capability Expo this October in Tampa, FL.

Oregon Business asks Tozny CEO about public database breaches

Tozny CEO talks security breaches with Charlie Kawasaki and Oregon Business. “Prevention is actually by far the cheapest way to mitigate.” Oregon’s rules for data breach reporting changed a year ago to require businesses and government agencies to notify the Attorney General’s office when a breach occurred impacting more than 250 Oregonians. The breaches are then logged into a public …

Personal Data Services Promise User Privacy

There’s no question the data that organizations collect and share about users is valuable. Whether it’s content created by users or metadata about users, that information could be used to streamline healthcare or corporate operations, prevent fraud, or increase marketing opportunities. Data sharing by ad networks or data brokers is commonplace, yet users have virtually no visibility or control over …

FBI vs Apple: how did we get here?

Apple and the FBI have been headlining recently in a debate about cryptography. Crypto is one of those fields that very few people actually understand well; it’s nuanced and complex, just like the current debate, and small mistakes can have big consequences. I recently found myself picturing this debate in a series of over-simplified cartoons. I wonder if these can …

GCN Article: Making mobile phones the authentication hubs for smart homes

Our NSTIC privacy project was highlighted in an article at GCN by Derek Major. Tozny serves as the technical lead for the pilot programs and will build the data storage and sharing platform by tackling one of the weakest links in cybersecurity today: the password. Tozny’s solution replaces the username and password with something people use for almost everything: the …