Explore >> Select a destination


You are here

blog.dshr.org
| | www.schneier.com
4.9 parsecs away

Travel
| | Today's world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling. In security, threat modeling is the process of determining what security measures make sense in your particular situation. It's a way to think about potential risks, possible defenses, and the costs of both. It's how experts avoid being distracted by irrelevant risks or overburdened by undue costs...
| | www.cyber-risk-gmbh.com
4.9 parsecs away

Travel
| | Cyber risk and the Board of Directors - The Board must assess cybersecurity risks, challenge security plans, and evaluate policies and solutions
| | www.eff.org
3.8 parsecs away

Travel
| | It's time to shed light on the technical methods and business practices behind third-party tracking. For journalists, policy makers, and concerned consumers, this paper will demystify the fundamentals of third-party tracking, explain the scope of the problem, and suggest ways for users and legislation to fight back against the status quo.
| | dianeravitch.net
28.8 parsecs away

Travel
| Carol Burris, executive director of the Network for Public Education, is an expert on charter schools and charter legislation. For the past decade, she has studied the charter school movement, state charter laws, and federal funding for charters and the consequences of those laws and funding more closely than anyone I know. She wrote the...