Digital Security Articles & Newsletters

    Art lab punch clock

    Leaking on the clock: What your sources need to know

    Source protection Article

    Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?

    default social card (URL location fixed)

    Digital security training course catalog

    Guide

    The Digital Security Training track currently offers a variety of courses covering the most salient and pressing issues facing journalists and technology in the current day. FPF offers courses in 90-minute, 3-hour, and full-day formats; in order to accommodate organizations requiring for more flexibility in scheduling. Some courses include hands-on …

    default social card (URL location fixed)

    Your password was breached. Now what?

    Account security Guide

    Data breaches, and in particular those including personal passwords for websites or apps, are evergreen news stories that repeat themselves like an Advent calendar for cybersecurity failures. Although these breaches are a regular phenomena, they are trailed by a long, drawn-out window of time where other attackers use breached data …

    default social card (URL location fixed)

    Proton Mail like a pro

    Communication security Guide

    Proton Mail is a Switzerland-based email client that offers end-to-end encryption between its users by default. This means that communication between anyone whose email is managed by Proton Mail can only be viewed by members of that party; No outside parties, including Proton Mail itself, can view the content of …