As secure as your platform might be, chances are high that your users are using the same password for your system as they are for another site or service. Why use passwords at all?
Visit Tozny at the RSA Conference
We are now in an age where security can breached with just a simple push of a button. With today’s technological breakthroughs come an increasing demand for a more well-rounded and tightened cybersecurity. The tools … Read More
SimpleSAMLphp for Easy Identities
Our most recent series has detailed what’s involved in building and configuring your own centralized authentication service built atop the open source SimpleSAMLphp project.
NIST Global City Teams Challenge Super Action Cluster Summit
Tozny recently participated in the Global City Teams Challenge Super Action Cluster Summit with a focus on the security and privacy of connected vehicles. Feb 01, 2017 to Feb 02, 2017 12:30 pm – C123/124 Lunch … Read More
Top Ten Privacy Checklist Before Direct Action
Greg Stromire provided a great list of privacy protections you can take before participating in direct action as a part of his recent Data Privacy for Activists workshop. Because your mobile device is likely to be one of the most obvious ways of breaching your privacy, many of these are about protecting you mobile device.