Search results
Jump to navigation
Jump to search
Page title matches
- Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline656 bytes (81 words) - 22:24, 28 November 2020
- ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down4 KB (697 words) - 22:11, 15 May 2015
- ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:10 KB (1,602 words) - 17:40, 7 November 2019
- * mobile security high priority because access by marginalized community * integrate security into digital literacy5 KB (782 words) - 19:34, 22 November 2016
- Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a5 KB (774 words) - 08:38, 30 December 2019
- Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin4 KB (656 words) - 01:07, 29 November 2020
- 0 bytes (0 words) - 22:26, 26 November 2018
- Security practitioners solidarity circle * Integrating digital security with operational security (e.g. who are you trusting as a member of your circle??)1 KB (217 words) - 19:17, 22 December 2024
- ...ased on fear, militarism. What does that mean as we think about safety and security? **We don't have movement security center organizations/formations/business; they are few and far between (The5 KB (803 words) - 02:06, 31 December 2024
- How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=4 KB (622 words) - 16:37, 17 November 2017
- 178 bytes (30 words) - 17:57, 5 May 2015
- ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++16 KB (953 words) - 23:34, 28 November 2020
- [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].3 KB (426 words) - 21:45, 22 November 2016
- * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)1 KB (206 words) - 18:42, 9 December 2023
- ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t424 bytes (68 words) - 21:30, 20 May 2015
- 0 bytes (0 words) - 00:47, 28 November 2018
- - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an4 KB (631 words) - 00:55, 4 February 2020
- organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna5 KB (776 words) - 23:46, 21 November 2017
- * Communication security and counter surveillance * security training for activists6 KB (855 words) - 18:28, 5 May 2015
- ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting329 bytes (44 words) - 21:30, 20 May 2015
Page text matches
- Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline656 bytes (81 words) - 22:24, 28 November 2020
- ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting329 bytes (44 words) - 21:30, 20 May 2015
- Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers2 KB (314 words) - 00:38, 30 November 2017
- Security practitioners solidarity circle * Integrating digital security with operational security (e.g. who are you trusting as a member of your circle??)1 KB (217 words) - 19:17, 22 December 2024
- *general WordPress security Security1 KB (166 words) - 17:47, 5 May 2015
- * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)1 KB (206 words) - 18:42, 9 December 2023
- Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r149 bytes (25 words) - 12:22, 19 November 2017
- ...within alliance. To join EFA, folks need to agree to principals (privacy, security, creativity, free speech, access to knowledge), have to be a US-based not-f ...r security research for marginalized groups traditionally ignored by cyber security industry: journalists, activists, sex workers, etc.1 KB (167 words) - 19:19, 9 December 2023
- ...audit changes to installations made by clients for many reasons, including security. We saw some of the recent developments focused around the block editing i * Managing (and/or locking down) security review of code/plugins added by clients needs help. wpscan is a possible2 KB (278 words) - 18:47, 9 December 2023
- How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=4 KB (622 words) - 16:37, 17 November 2017
- Security in Plone: Strong record of security1 KB (197 words) - 22:11, 15 May 2015
- ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down4 KB (697 words) - 22:11, 15 May 2015
- Evaluating security risks when working with high-risk constituents II. Security Issues1 KB (213 words) - 18:07, 5 May 2015
- Security creates opportunity -“ you don't have to take advantage of it, but it sou How to approach security in a way that does not communicate threat to people, but empowerment.5 KB (743 words) - 23:37, 4 May 2015
- how do tech folx get rest of org to take security seriously (instilling fear?) user training: hands-on to build muscle memory (security table top exercises)2 KB (210 words) - 21:49, 9 December 2023
- Change your philosophy: doing the obvious “pre-digital” security practices =Physical Security=2 KB (314 words) - 23:32, 28 November 2017
- Tech security issues and legal issues often overlap operationally. There correct to avoid libel lawsuits, but needs to improve about security4 KB (618 words) - 22:09, 7 December 2018
- ...ased on fear, militarism. What does that mean as we think about safety and security? **We don't have movement security center organizations/formations/business; they are few and far between (The5 KB (803 words) - 02:06, 31 December 2024
- [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].3 KB (426 words) - 21:45, 22 November 2016
- * Security * How do we manage usability and security?2 KB (299 words) - 20:09, 22 November 2016