Search results

Jump to navigation Jump to search

Page title matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • 178 bytes (30 words) - 17:57, 5 May 2015
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • 0 bytes (0 words) - 22:26, 26 November 2018
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • 0 bytes (0 words) - 00:47, 28 November 2018
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • * For admins and site builders: http://drupal.org/security/secure-configuration * For everyone: http://drupal.org/security-team
    3 KB (443 words) - 21:30, 20 May 2015

Page text matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • *general WordPress security Security
    1 KB (166 words) - 17:47, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...within alliance. To join EFA, folks need to agree to principals (privacy, security, creativity, free speech, access to knowledge), have to be a US-based not-f ...r security research for marginalized groups traditionally ignored by cyber security industry: journalists, activists, sex workers, etc.
    1 KB (167 words) - 19:19, 9 December 2023
  • ...audit changes to installations made by clients for many reasons, including security. We saw some of the recent developments focused around the block editing i * Managing (and/or locking down) security review of code/plugins added by clients needs help. wpscan is a possible
    2 KB (278 words) - 18:47, 9 December 2023
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • Security in Plone: Strong record of security
    1 KB (197 words) - 22:11, 15 May 2015
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security creates opportunity -“ you don't have to take advantage of it, but it sou How to approach security in a way that does not communicate threat to people, but empowerment.
    5 KB (743 words) - 23:37, 4 May 2015
  • how do tech folx get rest of org to take security seriously (instilling fear?) user training: hands-on to build muscle memory (security table top exercises)
    2 KB (210 words) - 21:49, 9 December 2023
  • Change your philosophy: doing the obvious “pre-digital” security practices =Physical Security=
    2 KB (314 words) - 23:32, 28 November 2017
  • Tech security issues and legal issues often overlap operationally. There correct to avoid libel lawsuits, but needs to improve about security
    4 KB (618 words) - 22:09, 7 December 2018
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • * Security * How do we manage usability and security?
    2 KB (299 words) - 20:09, 22 November 2016
  • ...ps://www.flickr.com/photos/aspirationtech/31185195215/in/datetaken-public/ Security As Solidarity Install Signal]
    1 KB (136 words) - 00:42, 23 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)