Video Screencast Help

Encryption Blog

Results for Encryption Blog

Encryption can be a transformative and disruptive technology. It can transform otherwise perfectly good data into something completely unreadable, potentially disrupting typical enterprise systems such as data leak prevention, disk imaging, help desk ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments
Last time, I reviewed the issues associated with the use of disk image backups in a PGP® Whole Disk Encryption environment – or with any full disk encryption system for that matter, including hardware (or self-) encrypting drives. I closed by saying the ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments
Q: I have a frustrating issue whereby I can open encrypted files that have been sent to me by another PGP user on email, but when that same user uploads files to an FTP site I cannot decrypt any of the files. Even though it's the same person ...
Blog Entry by Doug McLean | 08 Apr 2009 | 0 comments
Q: I want to do an audit of my IT environment to see which machines are encrypted.  I want to make sure the machine's encrypted, not just have PGP installed. A: The best way to do this is to run a managed environment using PGP Universal. ...
Blog Entry by Doug McLean | 01 Apr 2009 | 0 comments
Q: After using various encryption solutions, we have chosen PGP as the best solution, but I have a couple of machines causing problems. These machines previously had  another vendor's full disk encryption product installed on them, but they have ...
Blog Entry by Doug McLean | 25 Mar 2009 | 0 comments
Silicon Valley is served by several public radio stations. One of the better weekend shows is entitled "On the Media" produced by WNYC in New York. Typically, it provides good review and analysis of how the mainstream media covered the election ...
Blog Entry by Doug McLean | 18 Mar 2009 | 0 comments
Component Costs per Record of Data Breach 2008 in the UK Every year PGP Corporation sponsors a series of research projects to determine trends and costs of data breach. These projects are carried out by the Ponemon Institute . Currently, ...
Blog Entry by Doug McLean | 16 Mar 2009 | 0 comments
I had the privilege last week of attending a joint meeting of the Internet Security Alliance , U.S. Chamber of Commerce , Business Software Alliance, and TechAmerica . The guest of honor was Melissa Hathaway who was appointed Acting Senior ...
Blog Entry by Doug McLean | 13 Mar 2009 | 0 comments
Q: I need to check the encryption status for all attached disk in an shell script.  I thought that pgpwde --enum would give me a current status, but it always appears to say "wde enabled" if the disk is encrypted or not.  Do I also need to ...
Blog Entry by Bryan Gillson | 11 Mar 2009 | 0 comments
John Dasher - Director of Product Marketing One of the more common queries I hear when talking with both customers and the press involves how I manage my computer/data security while traveling. People seem increasingly nervous about ...
Blog Entry by John Dasher | 10 Mar 2009 | 2 comments