Securely Collecting Biometric Data at the Edge

Privacy-Preserving Data Security and Identity Management to Support Machine Learning Use Cases The proliferation of wearable devices that are equipped with data sensors which monitor human activity and biometrics allows for cost effective data collection at the edge. The availability of cloud-based machine learning environments provides researchers and clinicians with …

Human Subject Research Data Privacy and Security

Tozny co-authors Human Factor and Ergonomics Society (HFES) Paper: Development of Human-Out-of-the-Loop Participant Recruitment, Data Collection, Data Handling, and Participant Management System As smartphones and wearable devices become ubiquitous, analysts in the field of human subject research (HSR) are chomping at the bit to access and analyze large datasets of …

Tozny partners with Charles River Analytics on a contract awarded by the NCI

National Cancer Institute Awards Charles River Analytics Funding to Develop Wearable Informatics Tuesday, March 23, 2021 Charles River Analytics was awarded ~$400K contract from the National Cancer Institute to develop a privacy-preserving Wearable Health Informatics Platform for Extensible Research (WHISPER). WHISPER is an informatics tool for securely acquiring, querying, analyzing, …

Tozny Secures Data for Wearable Technology Health App

Tozny partners with Charles River Analytics and the National Cancer Institute to secure health data gathered with the privacy-preserving Wearable Health Informatics Platform for Extensible Research (WHISPER). WHISPER is an informatics tool for securely acquiring, querying, analyzing, and visualizing patient data. Go to article >

Announcing Encryption Groups with IAM

Easy Encrypted Sharing for Teams Collaboration is hard enough without having to worry about security. That’s why Tozny provides both identity management and end-to-end encryption for developers and enterprises alike. In the Tozny platform: Every user has an identity with role-based access control and single sign-on capabilities, Every identity has …

Identity (Management) Crisis

Over the past couple of years, online businesses have come to recognize the importance of robust access controls to limit the potential for data breaches. Covid-19 has only accelerated the need for such controls. What was already a migration to the cloud over the past few years has ramped up …

Defense in Depth

3 Considerations for Application-Layer Cryptography Information Security Officers make sure that company data is protected from hackers. Tozny partners with security teams and product owners, utilizing our deep expertise in end-to-end encryption and identity management to add defense in depth to security programs. Tozny CEO, Isaac Potoczny-Jones recently published a …

Tozny Introduces Free Secret Sharing App

Try it for Free! Securely Share Your Information Working from home for extended periods of time has its challenges - one of those is finding a way to share sensitive information securely and confidently. The Tozny team has developed a FREE secure sharing app called Tozny Secure Sharing to help ...