
Iscriviti e risparmia il 20% su un piano Premium o Families
Iscrivendoti, accetti di ricevere comunicazioni di marketing relative a notizie e ricerche di settore, risorse formative nonché prodotti e servizi LastPass. Acconsenti inoltre al trattamento dei tuoi dati personali in conformità con l’Informativa sulla privacy di LastPass. Puoi annullare l’iscrizione alle comunicazioni di marketing in qualsiasi momento.
Browse articles
- Cloud & Third-Party ThreatsUnderstanding and Managing SaaS SprawlWhat Is Shadow IT, and Why Is It So Risky?
- Compliance & FrameworksPenetration Testing: Protecting Your Data Understanding the Differences Between FISMA and FedRAMP Understanding FedRAMP Understanding the NIST Cybersecurity FrameworkAchieve HITRUST CSF Certification With LastPassHIPAA Compliance With LastPass Understanding PCI DSS (Payment Card Industry Data Security Standard)FISMA Compliance: Ensuring Data Security and Compliance GDPR Compliance: A Complete Guide for LastPass UsersWhat Is the COBIT Framework? A Detailed Guide for Enterprise IT Governance in 2026 Understanding CIS Controls for Effective Cyber DefenseNERC CIP Compliance: Ensuring Security with LastPass What is NIST Special Publication 800-53?What is ISO 27001 and How Does it Relate to LastPass? Understanding FIDO2 ComplianceNIST Special Publication 800-171: Staying Secure with LastPass
- Cybersecurity OverviewWhat Is Cybersecurity? What are the Most Common Cybersecurity Threats for Businesses?
- Identity Theft & FraudWhat Is SAML? The Complete Guide to Security Assertion Markup LanguageSAML vs SSO: Key Differences ExplainedUnderstanding the Difference: PIM vs PAMWhat Is OAuth? A Comprehensive GuideSAML vs. OAuth: A Comprehensive ComparisonMFA vs. SSO: A Comparison and GuideWhat Is Zero Trust?Signs of Identity TheftUnderstanding Privileged Identity Management Types of Identity TheftHow to Prevent Identity Theft IAM vs PAM: Choosing the Right Access Management SolutionUnderstanding Federated Identity Management What Is a Digital Footprint?What Is Identity Governance and Administration?Why Are Active Directory Password Resets Complicated?Understanding Active DirectoryAccount Hijacking: Protecting Your Online Security Ultimate Guide to Identity and Access Management (IAM) for BusinessesExploring Customer Identity and Access Management (CIAM)Attribute-Based Access Control (ABAC)Understanding Policy-Based Access Control (PBAC)Understanding Lightweight Directory Access Protocol (LDAP)Access Management: The Key to Secure and Efficient User AccessUnderstanding Role-Based Access Control (RBAC)
- Insider ThreatsWhat Is Data Leakage, and How Do I Prevent It?What Is an Insider Threat?
- Malware ThreatsWhat Is a Trojan Virus and How Do I Get Rid of It?Spyware: What It Is and How to Prevent ItUnderstanding Scareware and How to Stay ProtectedWhat Is Ransomware? An Intro for Business ProsWhat Is Malware?Understanding the Difference Between Malware and VirusesWhat Is Keylogging? How to Get Rid of Malware Understanding Fileless MalwareUnderstanding Emotet Malware Can You Get a Virus from Opening an Email?Understanding Adware and Protecting Your Online SecurityUnderstanding Ransomware-as-a-Service: Detection and Implications
- Mobile & IoT ThreatsWhat Is Sim Swapping and How to Protect YourselfHow to Find Spyware on iPhone and Remove ItHow to Detect and Remove Spyware from Your Android Phone in 2025
- Network Security ThreatsUnderstanding the Difference between DoS and DDoS Attacks Is it Safe to Access Online Accounts on Public Wi-Fi? Protect Against Man-in-the-Middle AttacksWhat Is a Denial of Service (DoS) Attack? What Is a Distributed Denial of Service (DDoS) Attack? Understanding Man-in-the-Browser AttacksAdvanced Persistent Threat: Secure Your Passwords
- Password SecurityUnderstanding Shoulder Surfing and How to Prevent ItPassphrase vs Password: Understanding the Differences Passkeys Explained: Will Passwords Ever Go Away?What Is a One-Time Password (OTP)? How Secure Are Password Managers? Understanding Encryption and Zero KnowledgeMaintaining Good Password Hygiene: Best Practices and Tips The Smarter, Safer Way to Share Your Wi-Fi Password in 2026How Do People Manage Passwords in 2025? Understanding Password HashingIs Google Password Manager Safe in 2024?Password Expiration: Should You Change Your Passwords Regularly?The Perils of Employee Password ReuseWhat Is Credential Harvesting?Understanding Credential Stuffing vs Password SprayingCredential Stuffing: What It Is and How to Avoid It What Happens to an Individual's Credentials After They Are Stolen?NIST Recommends Length Over Complexity to Create Strong PasswordsThe Dangers of Using Common PasswordsShould You Use ChatGPT to Create Your Passwords?How to Stop Employees from Saving Passwords in Browser A Guide to the Best Password Managers: Unlock Digital SecurityFinding the Best Business Password ManagerWhat Is the Best Free Password Manager with Dark Web Monitoring for 2026?Understanding Dictionary AttacksUnderstanding Rainbow Table Attacks and How to Protect Against Them What Is a Brute Force Attack? What Makes a Master Password Strong and What Happens If You Forget It?
- Phishing & Social EngineeringUnderstanding Vishing and How to Protect Against ItUnderstanding Spoofing and How to Stay ProtectedWhat Is Smishing and How to Protect YourselfSmishing vs Vishing: How to Protect Yourself from BothUnderstanding Phishing and How to Protect Yourself Understanding Spear Phishing: Definition, Risks, and PreventionSpear Phishing vs Phishing: The Key Differences Spear Phishing vs. Whaling: What Are the Differences? Smishing vs Phishing: Key DifferencesUnderstanding Whaling PhishingSpoofing vs Phishing: What Are the Differences?How to Prevent Phishing Examples of Phishing AttacksWhat Is Social Engineering?How to Identify and Protect Yourself From Email PhishingCybersquatting: What It Is and How to Protect Yourself Understanding Clone Phishing and How to Protect Yourself Protecting Against CEO FraudWhat Is Catfishing, and How to Protect YourselfProtect Against Business Email Compromise in 2025What’s the Difference Between the Deep & Dark Web + the 8 Levels of Internet Myth How to Determine If a Website Is SafeHow to Check if a Link Is SafeEmail Spoofing: What Hackers Hope You Miss in 2025
- Web Application ThreatsWhat Is SQL Injection (SQLI) and How to Prevent It? Understanding Session Hijacking and How to Prevent ItWhat Is Clickjacking and How to Prevent It

Sicurezza informatica
Conformità al GDPR: una guida completa per gli utenti LastPass
September 11, 2024 • Di LastPass

Sicurezza informatica
Malware: cos’è?
July 10, 2024 • Di LastPass

Sicurezza informatica
Cosa sono le insider threat?
July 08, 2024 • Di LastPass

Sicurezza informatica
Il miglior password manager gratuito del 2024
July 03, 2024 • Di Shireen Stephenson

Sicurezza informatica
Social engineering: il significato
June 28, 2024 • Di LastPass

Sicurezza informatica
Comprendere il phishing e come proteggerti
June 27, 2024 • Di LastPass

Sicurezza informatica
Impronta digitale: che cos’è e perché è importante
June 20, 2024 • Di LastPass

Sicurezza informatica
Il ransomware: cos’è? Introduzione per professionisti
June 20, 2024 • Di LastPass

Sicurezza informatica
Guida completa alla gestione delle identità e degli accessi (Identity and Access Management, IAM) per le aziende
June 13, 2024 • Di LastPass

Sicurezza informatica
Aspirate alla certificazione SOC 2? Il vostro asso nella manica è un gestore di password
March 28, 2024 • Di Liz Corbett