Protecting Your Personal Privacy Helps Protect Your Organization's Security
Open Source Intelligence (OSINT)
What a VPN Does Not Protect you Against, Ways a Browser can Track You and A Guide to Browser Privacy Protection
What is Operational Security (OPSEC)? / OPSEC, Privacy and Data Brokers
The Dark Side of Data AI Profiling, Data Brokers, and OSINT
Reducing Your Digital Footprint
OSINT and Personal Information Online
Modern Surveillance Technologies and Public Spaces
Governmental Access to Private Data Through Data Brokers
Backdoors in US Telco Equipment-Background and History of CALEA and Edward Snowden's Revelations
Cell Site Simulators, Stingray, Hailstorm and IMSI Catchers
Privacy Concerns with the Data that Meta Captures
Microsoft Telemetry and Privacy
Google Data Capturing and Gemini
Apple Telemetry, Privacy and Siri AI Intelligence - Artificial Intelligence
Privacy Concerns and the Data that Amazon Captures
Automobile and Smartphone Data Collection and Privacy
ROKU, Smart TVs and Personal Privacy
8 VeraCrypt - Open-Source Disk Encryption
What is Tor?
https://www.virtualizationoptionsllc.com/forum/released-quick-briefings/what-is-tor
Protecting your contact's Information
Social Scoring Systems in the United States
Keeping Children Safe Online
https://www.virtualizationoptionsllc.com/forum/released-quick-briefings/keeping-children-safe-online
Protecting your Business from Radio Frequency Surveillence and Data Leakage
Web Tracking and Fingerprinting
Choosing a Secure Messaging Application for Personal Use and Small Organizations including Session, Signal, Telegram, WhatsApp and Briar
Messaging Applications for the Enterprise and Larger Organizations
End-to-End Messaging Applications Security, Privacy, and the Future
Caller ID and ANI Spoofing Prevention and Detection (Don't trust Caller ID to protect you!)
Securing Voice over IP
End to End Email Encryption
End-to-End Messaging Applications Security, Privacy, and the Future
Surveillance Technologies used at Public Events and keeping Secure and Private at such events
Community Organization - Security and Privacy Day-To-Day and during Public Events
Tutorial on Workplace Security for Employees
Securing your Home Network
https://www.virtualizationoptionsllc.com/forum/released-quick-briefings/securing-your-home-network
Security and Privacy in a Surveillance-Focused Environment (SFE)
Considerations in Selecting a Data Removal Service to Reclaim Your Privacy
Detecting and Protecting Yourself Against Deepfakes
Common Phishing Scams
https://www.virtualizationoptionsllc.com/forum/released-quick-briefings/common-phishing-scams
Passkeys, Authenticators, Numeric Tokens and other Authentication Methods
What to look for in Choosing Password Managers and Authenticator Applications
Email Aliases - Best Practices on their use for Security and Privacy
Real-Time Advertising Bidding Systems and their Misuse to Track your Location and Violate your Privacy
The Third-Party Doctrine and its Implications on Privacy
Choosing the Right Password Manager
Choosing the Right VPN Provider
US Government Concerns with Using Public VPN Services
Why strong passwords and password complexity actually matters
Reducing your Online Visibility
Financial Reporting Laws and their effects on your Privacy
When is a Free VPN not really Free
The Privacy implications of Client-Side AI Scanning and AI Assistants