Search results
Jump to navigation
Jump to search
Page title matches
- ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o8 KB (1,412 words) - 23:22, 20 May 2015
- ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==4 KB (643 words) - 19:26, 22 November 2016
- Evaluating security risks when working with high-risk constituents II. Security Issues1 KB (213 words) - 18:07, 5 May 2015
- Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers2 KB (314 words) - 00:38, 30 November 2017
- ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security5 KB (796 words) - 22:19, 7 December 2018
- The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.4 KB (755 words) - 17:47, 5 May 2015
- promoting herd immunity for digital security, lack of implemention around us endangers us2 KB (228 words) - 00:59, 22 November 2017
- Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real6 KB (879 words) - 22:05, 25 November 2021
Page text matches
- ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t424 bytes (68 words) - 21:30, 20 May 2015
- Keeping site security updated ** Drupal: Security updates only1 KB (205 words) - 20:44, 28 November 2016
- a. SMS Blasts (consider reliability, cost, features, security) c. Problem with SMS: security issues1 KB (197 words) - 18:25, 5 May 2015
- Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real6 KB (879 words) - 22:05, 25 November 2021
- security, workflow and accessibility. Come to this session to learn 10555 bytes (83 words) - 21:30, 20 May 2015
- ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security5 KB (796 words) - 22:19, 7 December 2018
- why don't people use security tools? - Hacking laptop/desktop config files for better security is still5 KB (889 words) - 18:25, 5 May 2015
- Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin4 KB (656 words) - 01:07, 29 November 2020
- organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna5 KB (776 words) - 23:46, 21 November 2017
- ** What does safety and security mean to your group? *** May not know digital security but they know what safety is to them.5 KB (852 words) - 19:38, 9 December 2023
- * Use redaction as a tool for information security630 bytes (95 words) - 23:37, 4 May 2015
- ...d).Activists want stuff that can be hosted on their own servers (for extra security) ...ODF. new, buggy software. Can collaboratively edit an ODF file. Also has a security layer.2 KB (361 words) - 23:37, 4 May 2015
- Session to synthesize providing support for digital security training efforts * Responsibility around providing security guidance3 KB (397 words) - 23:08, 30 November 2016
- * [[Security First Conversations]] * [[Human Rights Security and Privacy]]4 KB (491 words) - 00:55, 4 February 2020
- ...fferent. Best solution is to do lots of research with people who are doing security and research in that country. Overall security threat modelling approach:3 KB (471 words) - 23:21, 29 November 2017
- ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==4 KB (643 words) - 19:26, 22 November 2016
- security and surveillance: going to gmail security attacks that cannot3 KB (406 words) - 18:09, 7 November 2019
- * Information Strategy|Security|Integrity for NGOs - [https://www.opentech.fund/fellowships/difp Digital In1 KB (162 words) - 21:35, 30 March 2016
- E-(Aspiration) – works with Tech capacity and digital security – wants to do workshops in Spanish; how do we do it…what is needed to d * Cyber Security – there are not too many resources in Spanish2 KB (369 words) - 00:59, 20 November 2018
- Two classes of config, w/ security info & wihtout best practice is to #include security into settings.php2 KB (243 words) - 18:25, 5 May 2015