Video Screencast Help

Key Management Server (Key Management)

Results for Key Management Server (Key Management)

The Data Loss Database is a record of data breaches going back to 1995. As such it is one of the most comprehensive records of global breaches. Maintained by the Open Security Foundation, the DataLoss DB is published monthly . Below is the ...
Blog Entry by Doug McLean | 16 May 2009 | 0 comments
We spend a lot of space on our blogs talking about the hard and soft costs of data breaches. PGP Corporation also sponsors the annual Ponemon surveys of this topic. I don't tend to focus on it in my blog because I find the crimes that ...
Blog Entry by Doug McLean | 15 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager One of the problems of the Payment Card Industry Data Security Standard is that it will never reach a state of completion. That’s because PCI DSS it defines protections against known security risks, ...
Blog Entry by Brian Tokuyoshi | 15 May 2009 | 1 comment
Brian Tokuyoshi - Product Marketing Manager The PGP® Universal Server delivers the administrative functions for the PGP Encryption Platform . It’s the console that’s used by our largest customers to keep tabs on their applications, ...
Blog Entry by Brian Tokuyoshi | 12 May 2009 | 0 comments
There have been a number of calls lately for the creation of an agency like the Federal Emergency Management Agency (FEMA) focused on the Internet. The theory is that by integrating the currently fragmented cyber-security efforts of the Departments ...
Blog Entry by Doug McLean | 08 May 2009 | 0 comments
Brian Tokuyoshi - Product Marketing Manager In the pursuit of providing protection for enterprise data, many organizations make the mistake of thinking that their responsibilities to protect data start and end with the deployment of an ...
Blog Entry by Brian Tokuyoshi | 07 May 2009 | 0 comments
Shilpi Dey- Product Marketing Manager PGP Corporation recently announced a new product - PGP® Whole Disk Encryption Workgroup Edition which is specifically tailored to protect small companies and enterprise workgroup’s data on laptops, desktops ...
Blog Entry by Shilpi Dey | 01 May 2009 | 0 comments
Earlier this month, Senators John Rockefeller (D, West Virgina) and Olympia Snowe (R, Maine) introduced S.773, the Cybersecurity Act of 2009 . It's actually a companion bill to one they proposed a few days earlier to create a cabinet level ...
Blog Entry by Doug McLean | 14 Apr 2009 | 2 comments
Encryption can be a transformative and disruptive technology. It can transform otherwise perfectly good data into something completely unreadable, potentially disrupting typical enterprise systems such as data leak prevention, disk imaging, help desk ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments
Last time, I reviewed the issues associated with the use of disk image backups in a PGP® Whole Disk Encryption environment – or with any full disk encryption system for that matter, including hardware (or self-) encrypting drives. I closed by saying the ...
Blog Entry by Bryan Gillson | 08 Apr 2009 | 0 comments