| Similar Articles |
 |
Macworld April 2003 Glenn Fleishman |
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them.  |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone.  |
PC World September 2005 Andrew Brandt |
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data.  |
InternetNews May 10, 2005 Michael Singer |
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products.  |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be.  |
PC World July 22, 2002 Deborah Radcliff |
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear.  |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe.  |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer.  |
InternetNews April 2, 2007 Andy Patrizio |
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability.  |
Salon.com March 27, 2002 Bill Lamb |
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver?  |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day.  |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality.  |
InternetNews May 11, 2007 Andy Patrizio |
Intel, PGP In Security Hookup Intel and PGP have announced a partnership to sell encryption products on systems with Centrino Pro and vPro technologies.  |
Linux Journal September 2001 Mick Bauer |
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG...  |
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes  |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run.  |
PC Magazine April 24, 2007 Neil J. Rubenking |
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security.  |
InternetNews April 10, 2006 David Needle |
IBM's Answer to Security Blues IBM said it's developed technology that promises to bring mainframe-inspired levels of security to PCs, cell phones, PDAs and other digital devices.  |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce.  |
Bank Systems & Technology July 28, 2006 |
Encrypting From the Inside Northern Trust Images Checks With Fiserv... Largest Worldwide Core Banking Deployment... Fremont Bank Launches E-Mortgage Solution...  |
InternetNews July 16, 2004 Michael Singer |
Philip Zimmermann, PGP Creator The e-mail encryption software writer talks about ways technologists can protect privacy and still make money.  |
InternetNews June 5, 2006 Paul Shread |
Storage Security Vendors Stay Busy Kasten Chase may have closed its doors, but other storage security vendors are busy rolling out new products.  |
PC Magazine October 1, 2003 Cade Metz |
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market.  |
InternetNews April 29, 2010 |
Symantec Picks Up PGP, GuardianEdge Acquisitions should help Symantec vendor raise its profile in the data encryption space, key technology used for sharing and storing information in the cloud.  |
Entrepreneur November 2002 Mike Hogan |
Unhappy Trails Keeping your private communications secure isn't as easy as you might think. Any way you look at it, our reliance on e-mail and IM makes it difficult to keep proprietary information private.  |
PC Magazine August 31, 2005 Ryan Naraine |
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications.  |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it.  |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy.  |
PC Magazine October 14, 2003 Leon Erlanger |
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions.  |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it?  |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption.  |
New Architect January 2003 Thomas Claburn |
Pretty Good Isn't Good Enough Phil Zimmermann, creator of PGP (Pretty Good Privacy) encryption, won the crypto war. Whither privacy?  |
PC World August 2004 Jeff Bertolucci |
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes?  |
InternetNews June 25, 2009 Alex Goldman |
IBM Claims Privacy Breakthrough for Cloud, Data Researcher Craig Gentry claims to have developed a new method for manipulating encrypted data - with major implications for data security, antispam efforts and cloud computing.  |
PC World November 2005 Dennis O'Reilly |
10-Step Security If you have about an hour, you can batten down your machine's hatches against Net threats new and old. Here's how to protect your Window's operating system.  |
PC Magazine August 17, 2004 John R. Quain |
Dusting for Music Prints Biometric firm VeriTouch has a scheme for a new breed of MP3 player that would use built-in fingerprint readers to unlock encrypted music tracks.  |
InternetNews January 26, 2010 |
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches.  |
PC World October 2002 Stuart J. Johnston |
Plug Dangerous Holes in Word, Excel Bad guys have four new ways to target Microsoft's Office products.  |