Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Encryption Blog
Showing posts tagged with Perspectives
Showing posts in English
Robin Witty | 22 Oct 2009 | 1 comment

Robin Witty-Senior Product Marketing Manager

When spear-phishing, cybercriminals try to get sensitive data for fraudulent purposes from a specific organization by masquerading as a trusted sender in an email. Email hygiene security products (a must have!) catch the vast majority of email threats, including spear-phishing attempts.

Kelly Jackson Higgins of DarkReading succinctly lays out one case where email security wasn’t triggered. Here’s a short excerpt:

“Joshua Perrymon, CEO of PacketFocus, sent a spoofed LinkedIn email to users in different organizations...

Admin | 21 Oct 2009 | 0 comments

PGP Corporation is pleased to announce our support for Microsoft Windows 7.   For those who want to read the official word, check us out in the Windows 7 Compatibility Center.

While news of cybercrime may garner most of the headlines, research from the Ponemon Institue and DatalossDB tells us that lost laptops are the number one cause of data breaches worldwide.  And right behind system failures at number three are USB and portable storage devices - making protection of endpoints the number one concern for security professionals.

To help organizations control their risk, PGP Corporation offers a complete set of products to protect your endpoints.  Whether netbooks, notebooks or desktops...

Marc Briceno | 19 Oct 2009 | 2 comments

Marc Briceno - Director, Product Management

Last week saw the release of the “Evil Maid” attack targeting the open source TrueCrypt full disk encryption product.

The “Evil Maid” attack was implemented by Invisible Things Lab, whose principal is well respected in computer security circles for her work creating the “Blue Pill” virtualization malware.

As with the “Stoned Boot” attack that was announced earlier this year, “Evil Maid” is fundamentally malware. Neither attack demonstrates flaws in the underlying cryptographic security of any other full disk encryption product.

While disk encryption products such as PGP® Whole Disk Encryption can do very useful and desirable things to enhance your security posture - such as protect the data on your computer’s hard drive - full...

Doug McLean | 12 Oct 2009 | 0 comments

Doug McLean - Blogmeister

Since Mark Twain uttered the title of this blog in 1897, hundreds if not thousands of technologies have been declared "dead."  Some technology obituaries, vacuum tube computers spring to  mind, were completely accurate. However,  I've been in the computer industry long enough to know that successful computing technologies rarely ever "die," they just get repurposed to work in new environments or to solve new problems. The best examples I can think of are SGML (Simple Graphic Markup Language) and ODA (Office Document Architecture). Both of these technologies were hot in the early '80s when the industry was looking for standardizing the way computers told printers how to render a page (and coincidentally creating massive markets for document and content management).  It turns out that both of these...

Shilpi Dey | 06 Oct 2009 | 2 comments

Shilpi Dey - Product Marketing Manager

I spent the better part of last week at the Intel Developer Forum, a great forum that brings together various technology solution providers who are integrating the next generation of Intel technologies. It was exciting and an honor to showcase PGP® solutions for Intel® Anti-Theft and Intel® AES-NI.

Standing at the booth surrounded by dazzling demos and silicon chips, I was taken back to when I bought my first laptop almost a decade ago. It was from an online auction site and was advertised as “scrubbed clean”. On...

Admin | 05 Oct 2009 | 11 comments

As promised, we are pleased to announce the PGP Desktop v10 for Apple® Mac OS X beta program. This beta program will allow you to try the latest features for PGP Desktop Professional, PGP Desktop Home, PGP Desktop Email and PGP Whole Disk Encryption on Apple® Mac OS X platforms. In a nutshell, we think you'll find it simple, fast and secure, with:

  • Support for Snow Leopard 10.6 (x32 and x64)
  • Faster encryption and decryption
  • Safeguards against boot disk corruption

Here are a few things you might be wondering:

Which Apple® Mac OS X platforms are supported in the beta program? Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard)

What is the process? Details on the Beta program can be found here.  Once you complete and accept the beta license agreement you will...

Tim_Matthews | 23 Sep 2009 | 0 comments

Tim Matthews - Senior Director Product Marketing

Encryption and brand management make for an unlikely pairing. While both skilled disciplines, it's hard to imagine regular meetings between the math-mad elliptic curve tinkerer and Armani-clad glad hander archetypes. But the linkage between the two has only grown stronger the more of our lives we live online.

For those not familiar with how valuable a brand can be, there’s no better place to start than the Best Global Brands report by...

Brian Tokuyoshi | 22 Sep 2009 | 0 comments

Brian Tokuyoshi - Product Marketing Manager

The PCI Data Security Standard brought the issue of data encryption to light for many organizations. It established a baseline for security practices that highlighted some of the things that best-of-class security organizations already knew, such as specifying the types of data that must be protected and how to avoid risky practices that could expose such information to unauthorized access. It was necessary because the card processing industry is extensive and there needed to be guidelines to bring all the participating companies up to spec.

Yet it still appears to be clear that there are lingering misunderstandings about what it sought to achieve. From the viewpoint of the industry, it is easier to understand its purpose, for it gives the credit card industry better assurances to its customers that all the companies handling personal information have met a minimum set of security standards. From the...

Tim_Matthews | 15 Sep 2009 | 0 comments

Tim Matthews -Senior Director Product Marketing

Unless you've been hiding under a rock, you've no doubt heard a thing or two about cloud computing.  While an exciting shift for the entire industry, cloud computing is currently in "high hype mode," where separating hope from reality can be a challenge.  That's why PGP Corporatation signed on early to sponsor the excellent work of the Cloud Security Alliance (CSA).

The CSA is a non-profit organization formed to promote the use of best practices for providing security assurance within cloud computing.  The group's first work product, "Security Guidance for Critical Areas of Focus in Cloud Computing," is required reading for any security professional.   Now the focus is on understanding how organizations are viewing security in the...

Tim_Matthews | 27 Aug 2009 | 20 comments

Like everyone in the Macintosh user community, we're excited by Apple's early Friday delivery of Snow Leopard (Mac OS X 10.6). Unfortunately, like many applications at the moment, the currently shipping versions of PGP Desktop products (v 9.10) are not supported on Snow Leopard. This includes PGP Desktop Professional, PGP Desktop Home, PGP Desktop Email and PGP Whole Disk Encryption (a comprehensive list of Mac OS X applications and their status on Snow Leopard is available on the MacInTouch site).

While we are working diligently to complete the Snow Leopard compatible versions of the PGP Desktop products, we do not recommend you use the currently shipping versions on any system that has been upgraded to Snow Leopard. Please note that users wanting to migrate to Snow Leopard immediately must first decrypt all of their PGP WDE encrypted drives and uninstall...