Video Screencast Help

Encryption Blog

Results for Encryption Blog

Every year PGP Corporation sponsors a series of research projects to determine trends and costs of data breach. These projects are carried out by the Ponemon Institute . Currently, this research is carried out in the U.S., UK and Germany. This ...
Blog Entry by Doug McLean | 09 Feb 2009 | 0 comments
Shilpi Dey - Product Marketing Manager It arrived in a non-descript envelope, similar to the ones promising exciting credit card offers. I would have tossed it in the recycling bin without opening, except that it was from one of the banks (let’s ...
Blog Entry by Shilpi Dey | 03 Feb 2009 | 0 comments
A couple of days after I wrote last week that we will likely see an increase in the incidence of cybercrime as the world weathers the recession, the Wall Street Journal , in its role as an actual news gathering organization, documented what some ...
Blog Entry by Doug McLean | 02 Feb 2009 | 0 comments
Kevin Albright - Product Marketing Manager By now I’m sure you’ve heard about last week’s breach at Heartland Payment Systems. The number of total records compromised has not yet been released, but given California’s SB 1386 we should be hearing ...
Blog Entry by Kevin Albright | 02 Feb 2009 | 0 comments
ZDNet in the UK is reporting an interesting consequence of the spreading global recession. It seems that many British technology companies that have historically contributed to the Police Central E-crime Unit (PCeU) are instead offering staff in lieu ...
Blog Entry by Doug McLean | 26 Jan 2009 | 0 comments
Impressive piece by Kentucky Attorney General Jack Conway here . Mr. Conway is clearly one of the more technically savvy law enforcement officers in the U.S.  He is obviously committed to ensuring that the Kentuck criminal code keeps pace with the ...
Blog Entry by Doug McLean | 16 Jan 2009 | 2 comments
Since last we looked in on the governments progress in prosecuting the miscreants that perpetrated the watershed TJX breach, there have been limited develoments. In early November authorities charged one Stephen Watt of New York with conspiracy for ...
Blog Entry by Doug McLean | 13 Jan 2009 | 0 comments
(Security, Encryption Blog, Desktop Email Encryption, File Share Encryption (File Encryption), Key Management Server (Key Management), Symantec Endpoint Encryption - Device Control) () Symantec,Desktop Email ...
Blog Entry by Doug McLean | 12 Jan 2009 | 0 comments
Interesting piece in today's Wall Street Journal about President-Elect Obama's decision to appoint a cabinet level cybersecurity chief. The role as described will be one of those cross agency coordination jobs that has almost no staff or ...
Blog Entry by Doug McLean | 08 Dec 2008 | 0 comments
I've believed this for some time, but the author of this post does an unusually good job of describing how cybercrime gangs are now organized. I also really like the parallel's Michael draws between cybercrime gangs and their Mafia ...
Blog Entry by Doug McLean | 01 Dec 2008 | 0 comments