Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

The Security Panacea: Striking Balance with Usability

To keep up in today’s competitive technology market, perfecting the user experience is a must; making added security measures a tough sell to leadership. We consistently see brands sacrifice security, adopting the attitude, ‘it won’t happen to me.’ But when it does (which it will), brands are unprepared and scrutinized for their lack of foresight. Read the interview with Manuela …

Atlanta Streetcar has Tozny Built-In

We are excited to announce that the Atlanta Streetcar app was launched this morning with Tozny technology built in!  For the past year, moovel and Tozny worked together as part of a NIST Trusted Identities Group pilot to bring better digital identities technology to transit agencies.  Our technology allows for password-free secure authentication to mobile apps and web applications.  We …

Oregon Business asks Tozny CEO about public database breaches

Tozny CEO talks security breaches with Charlie Kawasaki and Oregon Business. “Prevention is actually by far the cheapest way to mitigate.” Oregon’s rules for data breach reporting changed a year ago to require businesses and government agencies to notify the Attorney General’s office when a breach occurred impacting more than 250 Oregonians. The breaches are then logged into a public …

Announcing Project E3DB: The End-to-End Encrypted Database

Welcome to E3DB! [Update: E3DB is out of preview and into production! We are looking for early adopter developers to try Project E3DB and give us feedback. Today, Project E3DB is a tool for programmers who want to build an end-to-end encrypted database with sharing into their projects. We are providing a command-line client for you to play with and a Java …

Webinar – Do More with Data by Getting Privacy Right

The Mobile Data To Knowledge team (MD2K) recently hosted our CEO, Isaac Potoczny-Jones for a webinar about security and privacy in mHealth. Watch the video on YouTube! Abstract: Obtaining user consent, enabling transparency, and securing data at rest are key security and privacy practices that let you do more with user data. Isaac will introduce an emerging type of technology …

DNC’s Email Leak Reinforces NIST’s “Security Fatigue” Study

A newly released report from the National Institute for Standards and Technology (NIST) suggests that users are in a state of “security fatigue” that leads them to risky-behavior in their digital lives. The study defines security fatigue as a weariness or reluctance to deal with computer security.  “Researchers found that the result of weariness leads to feelings of resignation and …

10 Unnerving Privacy Fails Thru Data Aggregation

There’s an old story that a reporter would always know when the US military was planning a big operation because they would order pizzas in the evening to support their secret late-night planning sessions. Similarly, during the cold war, Soviet intelligence agent Yuri Totrov could distinguish diplomats from CIA agents using data like pay scale, recruitment age, education, naturalization, and …

Post Yahoo, Passwords are Passé

14% of Worldwide Internet Users Were Exposed I’m sure if you are reading this, you are already aware of the historic Yahoo data breach that was announced last week.  500 million accounts affected – the largest number of accounts ever affected by a known breach.  Let’s put that into perspective – according to the US Census Population Clock, the current population …