Video Screencast Help

Encryption Blog

Showing posts tagged with File Encryption
Showing posts in English
Brendon Wilson | 21 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter

Last week, we held a webcast on Simplifying SSL Certificate Management.  Here’s a link to the replay [registration required]. As this was the first web cast for the new PGP TrustCenter Division of PGP Corporation, there were a wide variety of enthusiastic questions...so many, in fact, that we couldn't answer them all in the time available. I took a few minutes to summarize the questions and post the answers below.

Q: You mentioned that PGP TrustCenter’s data center is accredited by a number of security standards – which ones? Do you have SAS-70?

A: PGP TrustCenter’s data center is accredited according to ETSI (a European equivalent to WebTrust), Safe BIO-...

Andrew Klein | 19 May 2010 | 0 comments

Andrew Klein – Senior Product Marketing Manager

Thanks to everyone who attended the “A day in the life of a file” web cast, recently.  If you missed the web cast, here’s a link to the replay [registration required].  As always, there were many great questions covering a wide range of topics.  The questions and answers are summarized below.

Q:   Does PGP® Mobile support Android and iPhone devices?  If not, when?

A: PGP Mobile is available for Windows Mobile devices. We do receive a number of requests to add support for new devices based on Google Android and Apple iPhone platforms, and we are currently evaluating how support for those devices may fit on our roadmap.

Q:   What about the...

Brendon Wilson | 18 May 2010 | 0 comments

Brendon J. Wilson – Director of Marketing, PGP TrustCenter Division

Last year, online shoppers spent over $150B in online transactions in the US alone – it wasn’t long ago that the lack of transaction security would have made these revenues inconceivable. Today, the security provided by the Secure Sockets Layer (SSL) protocol not only enables organizations to collect payments on the web, but also to securely communicate sensitive business information to partners, and to deliver internal network resources to remote workers.

As the global recession continues, SSL provides organizations a way to thrive despite the financial downturn by enabling businesses to expand market reach, to streamline costs, to tap far-flung resources, and to explore new revenue opportunities. Tapping these opportunities requires SSL certificates from...

Doug McLean | 10 May 2010 | 0 comments

In the wake of the announcement last month that PGP Corporation has agreed to be acquired by Symantec, there have been a number of articles questioning what this acquisition means for PGP's "open source" policy.

For clarification, PGP Corporation is not and never has been an open source software provider. The term "Open Source" is correctly applied to companies that provide their product source code under the terms of a license that permit the licensee to use, alter, and redistribute the code. The complete requirements to qualify as an open source vendor are more numerous and complicated than I can cover here, but Wikipedia has a very concisely written summary.

Since PGP Corporation was founded eight years ago, we have made our source...

Andrew Klein | 28 Apr 2010 | 0 comments

Andrew Klein - Senior Product Marketing Manager

According to the folks at Privacy Rights Clearinghouse, since 2005 there have been over a thousand data breaches leading to over 320 million compromised records in the United States alone.  These records contained personal, financial and corporate information – none of which was encrypted.

The term “record” might imply a database record, but a majority of the breached records were not stored in a database, but instead were stored in “files” such as spreadsheets, documents and log files.  These files were stored on laptops, desktops, CDs and USB drives, which were stolen, lost or compromised. Some were files transferred in-the-clear over unprotected networks.  There were also breaches which occurred when personal financial information was posted on a web site, Social Security Account Numbers were...

Brian Tokuyoshi | 26 Apr 2010 | 0 comments

PGP recently held a webcast on email data protection to cover considerations about email protection along with information about the latest product release.

We didn’t have time to address all of the questions during the webcast, but I wanted to circle back and provide answers to the remaining questions from the Q&A.

Q: Does PGP have a client available?

A: Yes, PGP Desktop Email is a client-based approach towards email encryption. It provides end-to-end email encryption ensuring that information says protected all the way from the sender to the recipient, no matter what networks or systems it traverses.

Q: Can the PGP platform handle different encryption policies between internal and external email?

A: Yes, the policy engine in PGP...

Andrew Klein | 09 Apr 2010 | 1 comment

Andrew Klein - Senior Product Marketing Manager

Last week, we held a webcast on File Protection.  Here’s a link to the replay [registration required].  There were many great questions, so I took a few minutes to summarize the questions and post the answers.

Q:   Does PGP® NetShare do anything special to protect files against unauthorized file deletion, especially for client machines that do not have the PGP® NetShare client software installed?

A:    PGP® NetShare is concerned with protecting the contents of a file.  It does not protect users from deleting a file they have permission to delete.

Q:   What offering is there for Open Documents Formats on non-Windows platforms?

A:    PGP® NetShare is a...

Doug McLean | 05 Apr 2010 | 0 comments

That headline is not my assertion, but the conclusion reached by the Department of Justice itself. More specifically it's the conclusion of a report by the Department's Office of the Inspector General (OIG). The OIG's charter as stated on its website is below.

The Office of the Inspector General (OIG) conducts independent investigations, audits, inspections, and special reviews of United States Department of Justice personnel and programs to detect and deter waste, fraud, abuse, and misconduct, and to promote integrity, economy, efficiency, and effectiveness in Department of Justice operations.

Typically, the OIG's reports review the finances and activities of each of the Department's nine bureaus.  This particular report, however, reviews the entire Department of Justice's activities around identity theft since President Bush...

Doug McLean | 02 Apr 2010 | 3 comments

The Internet Crime Complaint Center published its annual Internet Crime Report earlier this month. The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA). Some of the numbers in the report this year are just stunning.

While the number of complaints of cybercrime filed with IC3 increased 22% in 2009 compared to 2008, the total dollar losses increased a staggering 111% after four years of being relatively flat.

Annual Cybercrime Losses

...

Tim_Matthews | 31 Mar 2010 | 1 comment

At the recent RSA Conference in San Francisco, I had the pleasure of moderating a panel on the topic of data breaches and how to handle them.  Along with Larry Ponemon, Founder and Chairman of the Ponemon Institute, and Jerry Archer, SVP and CSO at Sallie Mae, was David Shettler from the Open Security Foundation (OSF), publishers of DataLossDB.

Post-panel, as we were walking back through Moscone, David answered a question I had been wondering about: When was the first reported data breach?  Turns out that it happened over a century ago, in 1896, where the dispensary records for the Southern California Hospital for the Insane went missing, and were thought to be stolen.  So protection of...