Similar Articles |
|
Macworld August 15, 2005 Glenn Fleishman |
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. |
Macworld April 2003 Glenn Fleishman |
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. |
InternetNews May 10, 2005 Michael Singer |
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. |
PC World September 2005 Andrew Brandt |
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. |
PC Magazine April 24, 2007 Neil J. Rubenking |
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews May 11, 2007 Andy Patrizio |
Intel, PGP In Security Hookup Intel and PGP have announced a partnership to sell encryption products on systems with Centrino Pro and vPro technologies. |
PC World July 22, 2002 Deborah Radcliff |
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear. |
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes |
InternetNews April 2, 2007 Andy Patrizio |
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
PC Magazine October 1, 2003 Cade Metz |
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. |
PC World December 20, 2006 Andrew Brandt |
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. |
Salon.com March 27, 2002 Bill Lamb |
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
Linux Journal September 2001 Mick Bauer |
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG... |
PC Magazine June 13, 2011 Eric Griffith |
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
PC World March 20, 2007 Dunn & Spanbauer |
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. |
Information Today May 16, 2011 |
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. |
PC Magazine June 16, 2009 Eric Griffith |
2009 Windows Utility Guide Browse our largest-ever collection of utilities to install on Windows XP and Vista (and, in some cases, even Windows 7) and you'll find the functions you need at prices you'll like. |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
PC Magazine February 2, 2005 David A. Karp |
Save and Protect Your Hard Drive You can prepare for disaster by taking steps now to protect your PC's most valuable asset: its hard drive. |
PC World August 2004 Jeff Bertolucci |
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes? |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
PC Magazine May 4, 2005 Sarah Pike |
2005 Utility Guide Spend any time with your PC and you'll quickly realize that man cannot live by Windows (and Office, and a browser) alone. |
Bank Systems & Technology July 28, 2006 |
Encrypting From the Inside Northern Trust Images Checks With Fiserv... Largest Worldwide Core Banking Deployment... Fremont Bank Launches E-Mortgage Solution... |
InternetNews March 12, 2007 Andy Patrizio |
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... |
PC World December 7, 2007 Becky Waring |
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. |
Popular Mechanics October 20, 2008 John Brownlee |
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
BusinessWeek December 22, 2003 Stephen H. Wildstrom |
Keys That Remember -- And A Lot More The newest batch of USB keys can help secure data or redo the look of a PC. |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. |
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
InternetNews February 22, 2008 Andy Patrizio |
Laptop Encryption Has a Point of Weakness Researchers find a way to get at disk encrypted passwords under the right circumstances. |
JavaWorld August 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
PC Magazine October 14, 2003 Leon Erlanger |
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. |
PC World May 2001 Stan Miastkowski |
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... |