Search results

Jump to navigation Jump to search

Page title matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • 178 bytes (30 words) - 17:57, 5 May 2015
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • 0 bytes (0 words) - 22:26, 26 November 2018
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • 0 bytes (0 words) - 00:47, 28 November 2018
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • * For admins and site builders: http://drupal.org/security/secure-configuration * For everyone: http://drupal.org/security-team
    3 KB (443 words) - 21:30, 20 May 2015
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o
    8 KB (1,412 words) - 23:22, 20 May 2015
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • promoting herd immunity for digital security, lack of implemention around us endangers us
    2 KB (228 words) - 00:59, 22 November 2017
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021

Page text matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • *general WordPress security Security
    1 KB (166 words) - 17:47, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...within alliance. To join EFA, folks need to agree to principals (privacy, security, creativity, free speech, access to knowledge), have to be a US-based not-f ...r security research for marginalized groups traditionally ignored by cyber security industry: journalists, activists, sex workers, etc.
    1 KB (167 words) - 19:19, 9 December 2023
  • ...audit changes to installations made by clients for many reasons, including security. We saw some of the recent developments focused around the block editing i * Managing (and/or locking down) security review of code/plugins added by clients needs help. wpscan is a possible
    2 KB (278 words) - 18:47, 9 December 2023
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • Security in Plone: Strong record of security
    1 KB (197 words) - 22:11, 15 May 2015
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security creates opportunity -“ you don't have to take advantage of it, but it sou How to approach security in a way that does not communicate threat to people, but empowerment.
    5 KB (743 words) - 23:37, 4 May 2015
  • how do tech folx get rest of org to take security seriously (instilling fear?) user training: hands-on to build muscle memory (security table top exercises)
    2 KB (210 words) - 21:49, 9 December 2023
  • Change your philosophy: doing the obvious “pre-digital” security practices =Physical Security=
    2 KB (314 words) - 23:32, 28 November 2017
  • Tech security issues and legal issues often overlap operationally. There correct to avoid libel lawsuits, but needs to improve about security
    4 KB (618 words) - 22:09, 7 December 2018
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • * Security * How do we manage usability and security?
    2 KB (299 words) - 20:09, 22 November 2016
  • ...ps://www.flickr.com/photos/aspirationtech/31185195215/in/datetaken-public/ Security As Solidarity Install Signal]
    1 KB (136 words) - 00:42, 23 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • Keeping site security updated ** Drupal: Security updates only
    1 KB (205 words) - 20:44, 28 November 2016
  • a. SMS Blasts (consider reliability, cost, features, security) c. Problem with SMS: security issues
    1 KB (197 words) - 18:25, 5 May 2015
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021
  • security, workflow and accessibility. Come to this session to learn 10
    555 bytes (83 words) - 21:30, 20 May 2015
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • why don't people use security tools? - Hacking laptop/desktop config files for better security is still
    5 KB (889 words) - 18:25, 5 May 2015
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • ** What does safety and security mean to your group? *** May not know digital security but they know what safety is to them.
    5 KB (852 words) - 19:38, 9 December 2023
  • * Use redaction as a tool for information security
    630 bytes (95 words) - 23:37, 4 May 2015
  • ...d).Activists want stuff that can be hosted on their own servers (for extra security) ...ODF. new, buggy software. Can collaboratively edit an ODF file. Also has a security layer.
    2 KB (361 words) - 23:37, 4 May 2015
  • Session to synthesize providing support for digital security training efforts * Responsibility around providing security guidance
    3 KB (397 words) - 23:08, 30 November 2016
  • * [[Security First Conversations]] * [[Human Rights Security and Privacy]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...fferent. Best solution is to do lots of research with people who are doing security and research in that country. Overall security threat modelling approach:
    3 KB (471 words) - 23:21, 29 November 2017
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • security and surveillance: going to gmail security attacks that cannot
    3 KB (406 words) - 18:09, 7 November 2019
  • * Information Strategy|Security|Integrity for NGOs - [https://www.opentech.fund/fellowships/difp Digital In
    1 KB (162 words) - 21:35, 30 March 2016
  • E-(Aspiration) – works with Tech capacity and digital security – wants to do workshops in Spanish; how do we do it…what is needed to d * Cyber Security – there are not too many resources in Spanish
    2 KB (369 words) - 00:59, 20 November 2018
  • Two classes of config, w/ security info & wihtout best practice is to #include security into settings.php
    2 KB (243 words) - 18:25, 5 May 2015
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * digital security work in protests, researc for people in oppressed areas * anti-doxxing and security
    3 KB (386 words) - 19:28, 9 December 2023
  • ...corner of the screen do not encourage an awareness of or accountability to security issues. ...achable legacy applications with identity management systems, facilitating security and compliance, streamlining administration and reducing development costs.
    4 KB (600 words) - 21:47, 20 May 2015
  • Security versus Anonymity. EFF has an animation online that explains this difference
    776 bytes (122 words) - 17:47, 5 May 2015
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • ...nd also make sure you're not giving away your data is important – a lot of security motivation in NSA news recently * many groups are not motivated to think about back-ups or security in general
    3 KB (426 words) - 17:21, 5 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * Security * privacy, security concerns
    2 KB (365 words) - 21:30, 20 May 2015
  • false sense of security from 'safe practices' Strict transport security header that tells not only does this site use https but disallow any usage
    4 KB (717 words) - 17:47, 5 May 2015

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)