Search results

Jump to navigation Jump to search

Page title matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • 178 bytes (30 words) - 17:57, 5 May 2015
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • 0 bytes (0 words) - 22:26, 26 November 2018
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • 0 bytes (0 words) - 00:47, 28 November 2018
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • * For admins and site builders: http://drupal.org/security/secure-configuration * For everyone: http://drupal.org/security-team
    3 KB (443 words) - 21:30, 20 May 2015
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o
    8 KB (1,412 words) - 23:22, 20 May 2015
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • promoting herd immunity for digital security, lack of implemention around us endangers us
    2 KB (228 words) - 00:59, 22 November 2017
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021

Page text matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • *general WordPress security Security
    1 KB (166 words) - 17:47, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...within alliance. To join EFA, folks need to agree to principals (privacy, security, creativity, free speech, access to knowledge), have to be a US-based not-f ...r security research for marginalized groups traditionally ignored by cyber security industry: journalists, activists, sex workers, etc.
    1 KB (167 words) - 19:19, 9 December 2023
  • ...audit changes to installations made by clients for many reasons, including security. We saw some of the recent developments focused around the block editing i * Managing (and/or locking down) security review of code/plugins added by clients needs help. wpscan is a possible
    2 KB (278 words) - 18:47, 9 December 2023
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • Security in Plone: Strong record of security
    1 KB (197 words) - 22:11, 15 May 2015
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security creates opportunity -“ you don't have to take advantage of it, but it sou How to approach security in a way that does not communicate threat to people, but empowerment.
    5 KB (743 words) - 23:37, 4 May 2015
  • how do tech folx get rest of org to take security seriously (instilling fear?) user training: hands-on to build muscle memory (security table top exercises)
    2 KB (210 words) - 21:49, 9 December 2023
  • Change your philosophy: doing the obvious “pre-digital” security practices =Physical Security=
    2 KB (314 words) - 23:32, 28 November 2017
  • Tech security issues and legal issues often overlap operationally. There correct to avoid libel lawsuits, but needs to improve about security
    4 KB (618 words) - 22:09, 7 December 2018
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • * Security * How do we manage usability and security?
    2 KB (299 words) - 20:09, 22 November 2016
  • ...ps://www.flickr.com/photos/aspirationtech/31185195215/in/datetaken-public/ Security As Solidarity Install Signal]
    1 KB (136 words) - 00:42, 23 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • Keeping site security updated ** Drupal: Security updates only
    1 KB (205 words) - 20:44, 28 November 2016
  • a. SMS Blasts (consider reliability, cost, features, security) c. Problem with SMS: security issues
    1 KB (197 words) - 18:25, 5 May 2015
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021
  • security, workflow and accessibility. Come to this session to learn 10
    555 bytes (83 words) - 21:30, 20 May 2015
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • why don't people use security tools? - Hacking laptop/desktop config files for better security is still
    5 KB (889 words) - 18:25, 5 May 2015
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • ** What does safety and security mean to your group? *** May not know digital security but they know what safety is to them.
    5 KB (852 words) - 19:38, 9 December 2023
  • * Use redaction as a tool for information security
    630 bytes (95 words) - 23:37, 4 May 2015
  • ...d).Activists want stuff that can be hosted on their own servers (for extra security) ...ODF. new, buggy software. Can collaboratively edit an ODF file. Also has a security layer.
    2 KB (361 words) - 23:37, 4 May 2015
  • Session to synthesize providing support for digital security training efforts * Responsibility around providing security guidance
    3 KB (397 words) - 23:08, 30 November 2016
  • * [[Security First Conversations]] * [[Human Rights Security and Privacy]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...fferent. Best solution is to do lots of research with people who are doing security and research in that country. Overall security threat modelling approach:
    3 KB (471 words) - 23:21, 29 November 2017
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • security and surveillance: going to gmail security attacks that cannot
    3 KB (406 words) - 18:09, 7 November 2019
  • * Information Strategy|Security|Integrity for NGOs - [https://www.opentech.fund/fellowships/difp Digital In
    1 KB (162 words) - 21:35, 30 March 2016
  • E-(Aspiration) – works with Tech capacity and digital security – wants to do workshops in Spanish; how do we do it…what is needed to d * Cyber Security – there are not too many resources in Spanish
    2 KB (369 words) - 00:59, 20 November 2018
  • Two classes of config, w/ security info & wihtout best practice is to #include security into settings.php
    2 KB (243 words) - 18:25, 5 May 2015
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * digital security work in protests, researc for people in oppressed areas * anti-doxxing and security
    3 KB (386 words) - 19:28, 9 December 2023
  • ...corner of the screen do not encourage an awareness of or accountability to security issues. ...achable legacy applications with identity management systems, facilitating security and compliance, streamlining administration and reducing development costs.
    4 KB (600 words) - 21:47, 20 May 2015
  • Security versus Anonymity. EFF has an animation online that explains this difference
    776 bytes (122 words) - 17:47, 5 May 2015
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • ...nd also make sure you're not giving away your data is important – a lot of security motivation in NSA news recently * many groups are not motivated to think about back-ups or security in general
    3 KB (426 words) - 17:21, 5 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * Security * privacy, security concerns
    2 KB (365 words) - 21:30, 20 May 2015
  • false sense of security from 'safe practices' Strict transport security header that tells not only does this site use https but disallow any usage
    4 KB (717 words) - 17:47, 5 May 2015
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • # Wordpress has automatic security updates #* Blue Host has good customer support, security, not sure about privacy
    3 KB (548 words) - 21:46, 22 November 2016
  • ...session he'll share stories and learnings from his experiences, including security process, usability, and the full major-version life cycle, including end-of then in maintenace (bug fixes and security)
    3 KB (576 words) - 21:30, 20 May 2015
  • ...the security of marginalized communiites in development. Think privacy and security. A lot of tech, like Palantir, are built by white men to target marginalize *Prioritize security and privacy
    5 KB (774 words) - 00:27, 22 November 2017
  • * Security * Security - better to load your own fonts from your own server, but it varies from si
    3 KB (364 words) - 21:38, 22 November 2016
  • *Showed stealth video of the security and access entering a data center and the innards including a server rack a
    1 KB (175 words) - 23:37, 4 May 2015
  • --You always need human review of the translation, especially from a security standpoint. --Is there a security concern when using corporate cloud based products to translate sensitive do
    7 KB (929 words) - 00:11, 29 November 2017
  • This process emerged from security practices training / support for clients ...rganizational capacity. We want to empower people to think about their own security.
    8 KB (1,299 words) - 23:03, 30 November 2016
  • * [[Summit agenda brainstorming for digital security practitioners]] - Lisa, Amanda, Martin * [[Organizational digital security]] - Jack, Lisa
    6 KB (883 words) - 21:26, 30 November 2017
  • want to use it, what security it provides, and policy and legal issues. * curious about data security for org and clients
    5 KB (790 words) - 21:30, 20 May 2015
  • ...e https, perfect forward secrecy, disabling SSLv3 (an older version with a security vulnerability), marking cookies as secure to encrypt them, etc
    3 KB (453 words) - 23:37, 4 May 2015
  • * [[Security practitioners planning jam]] * [[Superbloom's Security accessibility framework]]
    4 KB (448 words) - 21:49, 9 December 2023
  • ...asium - Emails you when your software dependencies are out of date or have security warnings *Bug Crowd - Checks security vulnerabilities by having people to poke at your website
    3 KB (401 words) - 23:37, 4 May 2015
  • ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o
    8 KB (1,412 words) - 23:22, 20 May 2015
  • * Sami from info security coalition. *vsee.com - like skype, but more video and more security
    4 KB (661 words) - 17:47, 5 May 2015
  • * [[Top reasons not to care about information security]] * [[Well maintained information security curricula]]
    5 KB (667 words) - 23:36, 12 August 2019
  • * Security ...itectural change in D8--if Symfony or Twig (new templating framework) have security releases, Drupal will need to as well.
    6 KB (966 words) - 17:21, 5 May 2015
  • Security vs. Archive security
    3 KB (536 words) - 18:07, 5 May 2015
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 17:42, 7 November 2019
  • ...r this reason, even though a large majority of the code is not relevant to security-related issues. The best way to help this is to build the community. The
    4 KB (641 words) - 23:22, 20 May 2015
  • * Is the data in your use case super sensitive? What security threats should you be concerned about? * What your security/privacy model is?
    4 KB (612 words) - 22:33, 26 November 2018
  • * Digital Security Helpline: https://www.accessnow.org/help/
    3 KB (349 words) - 02:23, 19 November 2021
  • Security & Vetting for your Community
    2 KB (225 words) - 19:03, 9 December 2023
  • ''C'' What about Agile and security? ...curity issues and risks from the beginning of the project--i.e. don't make security part of an Agile workflow.
    8 KB (1,324 words) - 22:23, 26 November 2018
  • ** security **data security rules
    5 KB (822 words) - 23:37, 4 May 2015
  • *VPN is only a single hop security, meaning that it can still give location and name information. If someone r '''If there is any security advantage of having multiple hidden services in one server'''
    4 KB (751 words) - 23:37, 4 May 2015
  • Security Pillars: analytics, personalization, security
    4 KB (608 words) - 16:41, 17 November 2017
  • * Seguridad on Espanol / Security in Spanish
    2 KB (275 words) - 22:40, 30 March 2016
  • ...company writing a module for their own service or API it’s OK. We don’t do security support for stuff that’s not on Drupal.org. Discussed privacy/security vs. convenience.
    4 KB (659 words) - 18:13, 5 May 2015
  • promoting herd immunity for digital security, lack of implemention around us endangers us
    2 KB (228 words) - 00:59, 22 November 2017
  • 3) Open Source Security Auditing Project - starting soon, to audit the security of open source products. We need to demonstrate that open source is more
    4 KB (664 words) - 18:48, 5 May 2015
  • * [[Shared Security Protocols for CMS Communities]] * [[Training: Drupal Security and Performance Tuning]]
    6 KB (770 words) - 21:35, 20 May 2015
  • ...ment (and maybe some docs) [security caveat: if you have a dependency with security exploit, you have to redeploy the entire package).
    4 KB (627 words) - 17:21, 5 May 2015
  • ** Security, privacy
    2 KB (254 words) - 19:42, 9 December 2023
  • Proctorware doesnt do much to internet cheating & creating privacy/security risks
    2 KB (291 words) - 23:49, 28 November 2020
  • *security *security
    7 KB (1,140 words) - 23:05, 24 November 2022
  • *Concerned about the security of supporter data Corporate tools do a pretty good job with security. But then privacy is a whole other issue.
    5 KB (800 words) - 22:45, 29 November 2017
  • * -concerns on security, replicatability * meetup is donating to occupy, but still a security issue
    9 KB (1,437 words) - 18:07, 5 May 2015
  • ** Data security
    2 KB (322 words) - 18:35, 9 December 2023
  • * relocated to japan – does organizational security work but now discovering asia isn’t heard in many contexts. Eg; timezones * digisec trainer and helpdesk manager in thailand. Security Matters. Digital rights in thailand. Always translating training materials
    7 KB (1,167 words) - 23:35, 24 November 2022
  • * Security *Keep security in mind – it might be better to not allow integrations in order to keep s
    5 KB (728 words) - 21:48, 22 November 2016
  • **** security ** security, encrypted emails!!
    5 KB (738 words) - 21:30, 20 May 2015
  • Digital security training for young people!
    2 KB (320 words) - 18:38, 9 December 2023
  • * job security vs tax credits * housing security
    6 KB (904 words) - 05:17, 18 November 2022
  • job security vs tax credits housing security
    6 KB (915 words) - 05:13, 18 November 2022
  • ...-> Only get plugins from wordpress.org. Some bad ones have malware or have security holes.
    2 KB (317 words) - 17:47, 5 May 2015
  • * Salesforce is working on legislation changes about security and records ...ithout notification to customers from subpeonas, some even without them, a security concern with using the cloud. Use cloud services with providers that you t
    5 KB (770 words) - 18:48, 5 May 2015
  • ...s of organizations cannot afford to maintain that code as it rots, creates security holes, etc.
    2 KB (346 words) - 23:37, 4 May 2015
  • Better security
    2 KB (304 words) - 19:10, 9 December 2023

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)