Video Screencast Help
Encryption Blog
Showing posts tagged with Key Management Server (Key Management)
Showing posts in English
Brian Tokuyoshi | 06 Jan 2010 | 0 comments

There’s been a great deal of talk going on about cloud computing. The benefits are clear, because organizations realize that the network is an extension of their data center and that they can avoid many of the scalability and capacity problems of the past. The fundamentals of the concept are compelling and real.

Yet there is still a great deal of trepidation, especially when it comes to security. That’s because that the concept of cloud computing needed to be tested first.   The first generation of cloud computing services addressed whether the infrastructure made sense.  Was it possible to build the types of services with the quality and reliability of an in-house application?

I think we’re turning the corner on the first generation and that’s why people are talking about security.  We’ve moved past whether the concept is feasible.  Now we need to know if it’s practical and safe. The second generation of...

Doug McLean | 05 Jan 2010 | 0 comments

Albert Gonzalez, the mastermind behind the TJX, Heartland and Hannaford Bros. breaches, recently admitted that he was also the perpetrator behind the 2007 breach of Target Stores. While it was a small breach in comparison to his other accomplishments, prosecutors deemed it worthy of adding another two years to the minimum sentence they are requesting.

The Reuters report on the case indicates Gonzalez will now serve 17 to 25 years for his crimes. What I found more interesting than the developments in Gonzalez' case was the mention that one of his co-conspirators, Steven Watt, who was convicted of developing the software Gonzalez used, has been sentenced to two years in prison for his contributions to Gonzalez crime spree. He also gets to spend an extra three years having all of his computer and Internet activities "monitored."

The reason I think this is...

Tim_Matthews | 04 Jan 2010 | 3 comments

On behalf of PGP Corporation, I'd like to thank everyone that has participated in the beta test of our latest product, PGP Desktop 10.0 PGP Whole Disk Encryption for Apple® Mac OS X.

Thanks to your input we've identified a number of issues that have been fixed in the latest build (Beta-2) which is now available at the beta site.  If you choose to download and install Beta-2, you will be given the option to also obtain and apply a new evaluation license which is valid for 60 days.

We appreciate any and all feedback from you: bugs, problems, suggestions, and improvements. Submit those here.

Shilpi Dey | 16 Dec 2009 | 0 comments

These days you don’t need to wait for holiday sales to buy the tiniest, highest capacity USB thumb drive you can find. A 2GB USB drive sells for under $10 in the US, and works great to put family pictures, your favorite music (yes, the 80s were a good era) and oh yeah, the customer files you need to share with Bob at the audit firm. There’s only one problem: these drives tend to get lost easily, or as what often happens with most people, you just can’t remember where you put it. If that happens, you have now put out confidential company data (and possibly personal data) free for all to see, out into the world. This can very quickly turn into an organizational nightmare when it turns out that the drive was indeed lost, and now your organization has to inform investors, its customers, and just about everybody else about this loss. A look at the...

Doug McLean | 14 Dec 2009 | 0 comments

Those of us in the information security business have been hoping with each passing year that the “next year” would be the one in which our elected representatives recognize the threats to our privacy and actually DO something about it. I think we can now say with a fair amount of certainty that in 2010, we’ll get our wish.

On both sides of the Atlantic the public sector has recently taken concrete steps to protect our personal information. Here in the U.S. the Senate has passed not one, but two bills out of committee that would materially protect U.S. citizens from the affects of large data breaches. The first (S.1490) is the Personal Data Privacy and Security Act; also known as the Leahy bill. The primary provision of S. 1490 prohibits the concealment of a data breach.  The companion bill (...

Doug McLean | 08 Dec 2009 | 0 comments

Doug McLean - Blogmeister

So why does an information security company care whether you use Facebook or Outlook to communicate? The answer is that PGP Corporation is committed to protecting our customers’ data regardless of where it is and what device it is on. Giving up email or migrating to a hybrid email/social networking platform does not absolve individuals and enterprises from protecting the confidential information contained in their messages, status updates and tweets.

In fact, it complicates the situation in that there is clearly a class of information you will never want resident on any platform over which you don’t have complete control. This need for secure communications, particularly in the case of the social networking platforms (SNP), will lead to private Twitter groups (Flocks?), identity verified Facebook groups, and user encrypted message archives.  NOW this gets interesting.

There has been...

Doug McLean | 02 Dec 2009 | 0 comments

The decline in the newspaper business has already killed some major publications, but for some reason has not (yet) killed off the category of publications known simply as "Advertisers." These are the free publications that typically carry three to four local stories each day, a few dozen syndicated features and lots and lots of ads for local businesses.

We have a couple of these publications in my neighborhood including one entitled the "Daily Post." In a cover story today, they reported that local police stopped a car early Sunday morning and in it found:

"...receipts, unopened mail, doctor's bills and checkbooks belonging to residents in Pleasanton, Menlo Park, Fremont, Atherton, Redwood City and Mountain View."

"If that wasn't enough,...

Doug McLean | 01 Dec 2009 | 0 comments

Doug McLean - Blogmeister

I audited a class at the local college recently. In the final 5 minutes of the final class, the instructor asserted that, “…social media will kill email.” As one of the very early adopters of email and responsible for bringing a number of email technologies to market, I dismissed his claim as the ranting of a tired lecturer who allowed his mouth to get a beat or two ahead of his brain. In retrospect, however, I’ve concluded he may have had a point.

I have to admit I didn’t see his point until I read a headline recently indicating that 92% of global email traffic is now spam. The fact that most email is junk isn’t news as the percent of measured spam has been hovering around 90% for quite some time. The fact that spam has dominated the email landscape for so long is helping to drive some interesting user behaviors, however.  We’re starting to see...

Tim_Matthews | 24 Nov 2009 | 1 comment

Last week I sat down to have a conversation with Kevin Beaver, CISSP and security consultant, on Windows 7 BitLocker. I came across and interesting post he wrote called BitLocker and Windows 7 - Things You Need to Consider. I thought he had some good points and wanted to find out more.

Play Podcast: [podcast]http://blog.pgp.com/assets/pgppodcast112309BLOG.mp3[/podcast]

Tim_Matthews | 12 Nov 2009 | 0 comments

I'm pleased to announce that, as of today, we are starting a new blog entitled "Ask the Expert." The goal of this thread is to give customers, partners, and others a forum to discuss encryption technology,  solutions, and issues from a somewhat different perspective than we normally do on our current websites. While we will certainly discuss PGP products, this isn't meant to be a replacement for PGP's Customer Support portal which is designed to answer detailed product usage and implementation issues.

Instead we'll discuss questions like:

  • When would should you use PGP Whole Disk Encryption vs. File/Folder Encryption?
  • What exactly is a hash function and why is the industry working so hard to develop new ones?
  • How to PGP Portable and PGP Zip differ functionally and from a security perspective?

We'll also take up non-product related issues...