Adobe Public Sector Blog

Data Centric Security

November 6, 2017 / Data Centric Security

Prepare Your Organization’s Response to a Data Leak—Before It Happens

Security practitioners all agree: when you “assume the breach” will happen, you can provide better security. This assumption forces organizations to consider not only protection, but also detection and responses to breaches.

How Digital Signatures Work – Under the Hood

A digital signature employs cryptography to provide two main information security capabilities: Authentication and Integrity.

November 15, 2016 / Data Centric Security

What is a Digital Signature and How to Apply One to an Adobe PDF

When people think of “digital signatures,” most picture the electronic signing of a contract or document online. It’s fast, convenient and eliminates the pain of 1) physically signing and hand-carrying a large stack of pages 2) losing a part of an important document and 3) needing all parties in one room to sign something.

August 22, 2016 / Data Centric Security

Mission Critical: An Update on Federal Cybersecurity

Last week, members of the cybersecurity community joined Adobe and Nextgov at an event called “Mission Critical: An Update on Federal Cybersecurity.” In a packed room near the White House, Dr. Steven Gottwals, technical director for security solutions at Adobe Systems Federal, outlined Adobe’s vision for improved federal cybersecurity based around adoption of data-centric security solutions.

June 16, 2016 / Data Centric Security

Cyber Defense: How to Protect Your Most Valued Digital Assets in 2016

Click here to read this article.