Video Screencast Help

Encryption Blog

Results for Encryption Blog

Brian Tokuyoshi - Product Marketing Manager Are you working on some big secrets that you need to keep safe? I am talking about REALLY BIG ones.  Where can you get a tool that will handle your needs? When I say “big secrets” I am actually ...
Blog Entry by Brian Tokuyoshi | 01 Jul 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager When people new to cryptography first start to learn about public keys, they start with the basics, usually involving a person named Alice and a person named Bob. One maxim that they learn is that a ...
Blog Entry by Brian Tokuyoshi | 30 Jun 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager I remember the first time that I heard about PGP software.  It was in the mid 90s, and I was working on email systems at the time, dealing with the vast number of proprietary email formats and building ...
Blog Entry by Brian Tokuyoshi | 24 Jun 2009 | 0 comments
I've been reviewing some of the other blogs covering cybercrime and want to share with you five that I've found most interesting. Kenyantykoon's Blog on African Cybercrime: A very good country-by-country summary of one of the hot ...
Blog Entry by Doug McLean | 22 Jun 2009 | 0 comments
The Data Loss Database is a record of data breaches going back to 1995. As such it is one of the most comprehensive records of global breaches. Maintained by the Open Security Foundation, the DataLoss DB is published monthly . Below is the ...
Blog Entry by Doug McLean | 16 Jun 2009 | 0 comments
The Data Loss Database is a record of data breaches going back to 1995. As such it is one of the most comprehensive records of global breaches. Maintained by the Open Security Foundation, the DataLoss DB is published monthly . Below is the ...
Blog Entry by Doug McLean | 16 Jun 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager By and large, the most popular use for the PGP Whole Disk Encryption product is to encrypt the primary hard drive on laptops.  This is a use case that addresses very specific requirements to prevent ...
Blog Entry by Brian Tokuyoshi | 04 Jun 2009 | 2 comments
Shilpi Dey - Product Marketing Manager There is no doubt that firewalls are no longer sufficient as the sole security strategy of choice. Whether it’s your telecommuting employees, consultants, vendors, or your sales force in the field, ...
Blog Entry by Shilpi Dey | 26 May 2009 | 0 comments
A recent data breach at Johns Hopkins Hospital was announced that resulted from a single employee working in patient registration who accessed more than 10,000 pieces of personally identifying information. Reports of fraud started back in January ...
Blog Entry by Kevin Albright | 19 May 2009 | 0 comments
The Data Loss Database is a record of data breaches going back to 1995. As such it is one of the most comprehensive records of global breaches. Maintained by the Open Security Foundation, the DataLoss DB is published monthly . Below is the ...
Blog Entry by Doug McLean | 16 May 2009 | 0 comments