Video Screencast Help

Search

Search results

These days you don’t need to wait for holiday sales to buy the tiniest, highest capacity USB thumb drive you can find. A 2GB USB drive sells for under $10 in the US, and works great to put family pictures, your favorite music (yes, the 80s were a ...
Blog Entry by Shilpi Dey | 16 Dec 2009 | 0 comments
Those of us in the information security business have been hoping with each passing year that the “next year” would be the one in which our elected representatives recognize the threats to our privacy and actually DO something about it. I think we can ...
Blog Entry by Doug McLean | 14 Dec 2009 | 0 comments
Doug McLean - Blogmeister So why does an information security company care whether you use Facebook or Outlook to communicate? The answer is that PGP Corporation is committed to protecting our customers’ data regardless of where it is and what ...
Blog Entry by Doug McLean | 08 Dec 2009 | 0 comments
The decline in the newspaper business has already killed some major publications , but for some reason has not (yet) killed off the category of publications known simply as "Advertisers." These are the free publications that typically carry ...
Blog Entry by Doug McLean | 02 Dec 2009 | 0 comments
Doug McLean - Blogmeister I audited a class at the local college recently. In the final 5 minutes of the final class, the instructor asserted that, “…social media will kill email.” As one of the very early adopters of email and responsible for ...
Blog Entry by Doug McLean | 01 Dec 2009 | 0 comments
Last week I sat down to have a conversation with Kevin Beaver, CISSP and security consultant, on Windows 7 BitLocker. I came across and interesting post he wrote called BitLocker and Windows 7 - Things You Need to Consider. I thought he had some good ...
Blog Entry by Tim_Matthews | 24 Nov 2009 | 1 comment
I'm pleased to announce that, as of today, we are starting a new blog entitled "Ask the Expert." The goal of this thread is to give customers, partners, and others a forum to discuss encryption technology,  solutions, and issues from a ...
Blog Entry by Tim_Matthews | 12 Nov 2009 | 0 comments
Most readers of this blog are aware of the unholy alliance between the world's spammers and cybercriminals. This partnership is based upon the spammer's ability to present scams to millions of innocent users on behalf of those the crooks that ...
Blog Entry by Doug McLean | 08 Nov 2009 | 0 comments
Doris Yang - Product Manager If you would like to extend your beta evaluation past the initial 30-day period, you can request a new beta license by resubmitting your beta request here .  Upon successful submission, you will receive an ...
Blog Entry by Doris Yang | 05 Nov 2009 | 2 comments
Robin Witty-Senior Product Marketing Manager When spear-phishing , cybercriminals try to get sensitive data for fraudulent purposes from a specific organization by masquerading as a trusted sender in an email. Email hygiene security products ...
Blog Entry by Robin Witty | 22 Oct 2009 | 1 comment