Software company Network Associates has stopped marketing its PGP e-mail encryption software, a further sign that privacy products are a tough sell. The Santa Clara ...
NEW YORK -- I'm well aware that sending e-mail is no more private than sending a postcard, but who wants to bother with protecting messages? It's so inconvenient. So, too lazy to phone, I e-mail ...
PGP Corp. is setting out to do what Network Associates couldn't--entice enterprise customers to buy PGP encryption products by making them easier to use. On Monday ...
MENLO PARK, Calif., April 7 /PRNewswire/ -- PGP Corporation, a global leader in enterprise data protection, today announced PGP(R) Whole Disk Encryption Workgroup Edition, a simple, easy-to-manage ...
A team of security researchers have demonstrated that common disk encryption technologies that are intended to keep data on computers safe from theft can be bypassed if an attacker gets a hold of the ...
PGP, first released in 1991, uses a form of encryption known as public-key cryptography. This means that if you use PGP, you create two encryption "keys," which are basically big chunks of random ...
The inventor of Pretty Good Privacy e-mail encryption last week left Network Associates, Inc. — the company he joined after selling it the rights to PGP in 1997 ...
PALO ALTO , Calif., Oct. 18 /PRNewswire/ -- PGP Corporation, a global leader in enterprise data protection, today announced that First Advantage Corporation (Nasdaq: FADV), a leading global provider ...
Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. Read now Most ...
According to the IT security vendor, the Whole Disk Encryption approval was granted by the INFOSEC Product Co-operation Group (DIPCOG) and comes just a few months after PGP's Whole Disk Encryption ...
Enterprise data security firmPGP on Wednesday began shipping its new NetShare product, as well as major upgrades to its encryption and e-mail security line of policy enforcement and key data ...