“We use many techniques to protect data: encryption, tokenization, masking, encryption in motion, encrypting at rest. To be very specific, […]
Old Phone Encryption: Another Reason to Upgrade
It would have been hard to miss the news earlier this year that the FBI was trying to get access […]