We took an in-depth look at the architecture, communications, and security of the LastPass Authenticator app in our lab in order to better understand the technology being used and whether or not the security is adequate for protecting a high-value asset such as LastPass.
Part 3 of our series about data classification policies.
Part 2 in our series about data classification policies.
Part 1 of our series on data classification policies.
Information Today has published a new article by Abby Clobridge about Let’s Encrypt, an important milestone in internet encryption.