Video Screencast Help

Encryption Blog

Results for Encryption Blog

We spend a lot of space on our blogs talking about the hard and soft costs of data breaches. PGP Corporation also sponsors the annual Ponemon surveys of this topic. I don't tend to focus on it in my blog because I find the crimes that ...
Blog Entry by Doug McLean | 15 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager One of the problems of the Payment Card Industry Data Security Standard is that it will never reach a state of completion. That’s because PCI DSS it defines protections against known security risks, ...
Blog Entry by Brian Tokuyoshi | 15 May 2009 | 1 comment
Brian Tokuyoshi - Product Marketing Manager The PGP® Universal Server delivers the administrative functions for the PGP Encryption Platform . It’s the console that’s used by our largest customers to keep tabs on their applications, ...
Blog Entry by Brian Tokuyoshi | 12 May 2009 | 0 comments
There have been a number of calls lately for the creation of an agency like the Federal Emergency Management Agency (FEMA) focused on the Internet. The theory is that by integrating the currently fragmented cyber-security efforts of the Departments ...
Blog Entry by Doug McLean | 08 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager In the pursuit of providing protection for enterprise data, many organizations make the mistake of thinking that their responsibilities to protect data start and end with the deployment of an ...
Blog Entry by Brian Tokuyoshi | 07 May 2009 | 0 comments
Shilpi Dey- Product Marketing Manager PGP Corporation recently announced a new product - PGP® Whole Disk Encryption Workgroup Edition which is specifically tailored to protect small companies and enterprise workgroup’s data on laptops, desktops ...
Blog Entry by Shilpi Dey | 01 May 2009 | 0 comments
Earlier this month, Senators John Rockefeller (D, West Virgina) and Olympia Snowe (R, Maine) introduced S.773, the Cybersecurity Act of 2009 . It's actually a companion bill to one they proposed a few days earlier to create a cabinet level ...
Blog Entry by Doug McLean | 14 Apr 2009 | 2 comments
Encryption can be a transformative and disruptive technology. It can transform otherwise perfectly good data into something completely unreadable, potentially disrupting typical enterprise systems such as data leak prevention, disk imaging, help desk ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments
Last time, I reviewed the issues associated with the use of disk image backups in a PGP® Whole Disk Encryption environment – or with any full disk encryption system for that matter, including hardware (or self-) encrypting drives. I closed by saying the ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments
Q: I have a frustrating issue whereby I can open encrypted files that have been sent to me by another PGP user on email, but when that same user uploads files to an FTP site I cannot decrypt any of the files. Even though it's the same person ...
Blog Entry by Doug McLean | 08 Apr 2009 | 0 comments