Video Screencast Help

Encryption Blog

Results for Encryption Blog

Shilpi Dey - Product Marketing Manager There is no doubt that firewalls are no longer sufficient as the sole security strategy of choice. Whether it’s your telecommuting employees, consultants, vendors, or your sales force in the field, ...
Blog Entry by Shilpi Dey | 26 May 2009 | 0 comments
A recent data breach at Johns Hopkins Hospital was announced that resulted from a single employee working in patient registration who accessed more than 10,000 pieces of personally identifying information. Reports of fraud started back in January ...
Blog Entry by Kevin Albright | 19 May 2009 | 0 comments
The Data Loss Database is a record of data breaches going back to 1995. As such it is one of the most comprehensive records of global breaches. Maintained by the Open Security Foundation, the DataLoss DB is published monthly . Below is the ...
Blog Entry by Doug McLean | 16 May 2009 | 0 comments
We spend a lot of space on our blogs talking about the hard and soft costs of data breaches. PGP Corporation also sponsors the annual Ponemon surveys of this topic. I don't tend to focus on it in my blog because I find the crimes that ...
Blog Entry by Doug McLean | 15 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager One of the problems of the Payment Card Industry Data Security Standard is that it will never reach a state of completion. That’s because PCI DSS it defines protections against known security risks, ...
Blog Entry by Brian Tokuyoshi | 15 May 2009 | 1 comment
Brian Tokuyoshi - Product Marketing Manager The PGP® Universal Server delivers the administrative functions for the PGP Encryption Platform . It’s the console that’s used by our largest customers to keep tabs on their applications, ...
Blog Entry by Brian Tokuyoshi | 12 May 2009 | 0 comments
There have been a number of calls lately for the creation of an agency like the Federal Emergency Management Agency (FEMA) focused on the Internet. The theory is that by integrating the currently fragmented cyber-security efforts of the Departments ...
Blog Entry by Doug McLean | 08 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager In the pursuit of providing protection for enterprise data, many organizations make the mistake of thinking that their responsibilities to protect data start and end with the deployment of an ...
Blog Entry by Brian Tokuyoshi | 07 May 2009 | 0 comments
Shilpi Dey- Product Marketing Manager PGP Corporation recently announced a new product - PGP® Whole Disk Encryption Workgroup Edition which is specifically tailored to protect small companies and enterprise workgroup’s data on laptops, desktops ...
Blog Entry by Shilpi Dey | 01 May 2009 | 0 comments
Earlier this month, Senators John Rockefeller (D, West Virgina) and Olympia Snowe (R, Maine) introduced S.773, the Cybersecurity Act of 2009 . It's actually a companion bill to one they proposed a few days earlier to create a cabinet level ...
Blog Entry by Doug McLean | 14 Apr 2009 | 2 comments