Video Screencast Help
Encryption Blog
Showing posts in English
Doug McLean | 14 Dec 2009 | 0 comments

Those of us in the information security business have been hoping with each passing year that the “next year” would be the one in which our elected representatives recognize the threats to our privacy and actually DO something about it. I think we can now say with a fair amount of certainty that in 2010, we’ll get our wish.

On both sides of the Atlantic the public sector has recently taken concrete steps to protect our personal information. Here in the U.S. the Senate has passed not one, but two bills out of committee that would materially protect U.S. citizens from the affects of large data breaches. The first (S.1490) is the Personal Data Privacy and Security Act; also known as the Leahy bill. The primary provision of S. 1490 prohibits the concealment of a data breach.  The companion bill (...

Doug McLean | 08 Dec 2009 | 0 comments

Doug McLean - Blogmeister

So why does an information security company care whether you use Facebook or Outlook to communicate? The answer is that PGP Corporation is committed to protecting our customers’ data regardless of where it is and what device it is on. Giving up email or migrating to a hybrid email/social networking platform does not absolve individuals and enterprises from protecting the confidential information contained in their messages, status updates and tweets.

In fact, it complicates the situation in that there is clearly a class of information you will never want resident on any platform over which you don’t have complete control. This need for secure communications, particularly in the case of the social networking platforms (SNP), will lead to private Twitter groups (Flocks?), identity verified Facebook groups, and user encrypted message archives.  NOW this gets interesting.

There has been...

Doug McLean | 02 Dec 2009 | 0 comments

The decline in the newspaper business has already killed some major publications, but for some reason has not (yet) killed off the category of publications known simply as "Advertisers." These are the free publications that typically carry three to four local stories each day, a few dozen syndicated features and lots and lots of ads for local businesses.

We have a couple of these publications in my neighborhood including one entitled the "Daily Post." In a cover story today, they reported that local police stopped a car early Sunday morning and in it found:

"...receipts, unopened mail, doctor's bills and checkbooks belonging to residents in Pleasanton, Menlo Park, Fremont, Atherton, Redwood City and Mountain View."

"If that wasn't enough,...

Doug McLean | 01 Dec 2009 | 0 comments

Doug McLean - Blogmeister

I audited a class at the local college recently. In the final 5 minutes of the final class, the instructor asserted that, “…social media will kill email.” As one of the very early adopters of email and responsible for bringing a number of email technologies to market, I dismissed his claim as the ranting of a tired lecturer who allowed his mouth to get a beat or two ahead of his brain. In retrospect, however, I’ve concluded he may have had a point.

I have to admit I didn’t see his point until I read a headline recently indicating that 92% of global email traffic is now spam. The fact that most email is junk isn’t news as the percent of measured spam has been hovering around 90% for quite some time. The fact that spam has dominated the email landscape for so long is helping to drive some interesting user behaviors, however.  We’re starting to see...

Tim_Matthews | 24 Nov 2009 | 1 comment

Last week I sat down to have a conversation with Kevin Beaver, CISSP and security consultant, on Windows 7 BitLocker. I came across and interesting post he wrote called BitLocker and Windows 7 - Things You Need to Consider. I thought he had some good points and wanted to find out more.

Play Podcast: [podcast]http://blog.pgp.com/assets/pgppodcast112309BLOG.mp3[/podcast]

Tim_Matthews | 12 Nov 2009 | 0 comments

I'm pleased to announce that, as of today, we are starting a new blog entitled "Ask the Expert." The goal of this thread is to give customers, partners, and others a forum to discuss encryption technology,  solutions, and issues from a somewhat different perspective than we normally do on our current websites. While we will certainly discuss PGP products, this isn't meant to be a replacement for PGP's Customer Support portal which is designed to answer detailed product usage and implementation issues.

Instead we'll discuss questions like:

  • When would should you use PGP Whole Disk Encryption vs. File/Folder Encryption?
  • What exactly is a hash function and why is the industry working so hard to develop new ones?
  • How to PGP Portable and PGP Zip differ functionally and from a security perspective?

We'll also take up non-product related issues...

Doug McLean | 08 Nov 2009 | 0 comments

Most readers of this blog are aware of the unholy alliance between the world's spammers and cybercriminals. This partnership is based upon the spammer's ability to present scams to millions of innocent users on behalf of those the crooks that would defraud them. The work of these two groups of miscreants most typically presents itself as phishing attacks on individuals and more recently spear phishing attacks of target corporations.

So it was with some interest that I noted two headlines in the data security trade press this week. The first was the verdict handed down to the self proclaimed "King of Spam," Sanford Wallace. A judge in California ordered Wallace to pay Facebook $712 million in damages for sending bogus emails to Facebook users. While it's a another...

Doris Yang | 05 Nov 2009 | 2 comments

Doris Yang - Product Manager

If you would like to extend your beta evaluation past the initial 30-day period, you can request a new beta license by resubmitting your beta request here

Upon successful submission, you will receive an email with a link containing your new license number.  You must enter the new license key in PGP Desktop for it to take effect.

Robin Witty | 22 Oct 2009 | 1 comment

Robin Witty-Senior Product Marketing Manager

When spear-phishing, cybercriminals try to get sensitive data for fraudulent purposes from a specific organization by masquerading as a trusted sender in an email. Email hygiene security products (a must have!) catch the vast majority of email threats, including spear-phishing attempts.

Kelly Jackson Higgins of DarkReading succinctly lays out one case where email security wasn’t triggered. Here’s a short excerpt:

“Joshua Perrymon, CEO of PacketFocus, sent a spoofed LinkedIn email to users in different organizations...

Admin | 21 Oct 2009 | 0 comments

PGP Corporation is pleased to announce our support for Microsoft Windows 7.   For those who want to read the official word, check us out in the Windows 7 Compatibility Center.

While news of cybercrime may garner most of the headlines, research from the Ponemon Institue and DatalossDB tells us that lost laptops are the number one cause of data breaches worldwide.  And right behind system failures at number three are USB and portable storage devices - making protection of endpoints the number one concern for security professionals.

To help organizations control their risk, PGP Corporation offers a complete set of products to protect your endpoints.  Whether netbooks, notebooks or desktops...