Cyber Risk Management tagged posts:

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |

eDiscovery in BYOD Environments

January 22nd, 2013 |
eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Using Data Anonymization To Enhance Cloud Security

January 21st, 2013 |
Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |

If Your Information Could Talk… Cyber-Safety in Social Media

December 20th, 2012 |
If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , ,

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

December 9th, 2012 |

Lafarge: Intuitive and Secure Computing for Business

December 2nd, 2012 |

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

November 27th, 2012 |

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting. [See the full post…]

Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Aria Systems: Providing the Foundation for an Expanding Cloud

September 20th, 2012 |
Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing [See the full post…]

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HPE - Hewlett Packard Enterprise, Intel, IT White Papers, Security Tags: , , , , , , , , , , , , , , , , ,

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

September 7th, 2012 |

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

September 6th, 2012 |

Air Products: Efficiently Managing a Global Fleet of PCs

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

WSH: Holding Risk at Bay

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: , , , , , , , ,

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Improving Healthcare Risk Assessments to Maximize Security Budgets

Improving Healthcare Risk Assessments to Maximize Security Budgets

IT Best Practices: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated [See the full post…]

Download PDFRead/Download PDF  

Categories: Healthcare, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , ,

Inertia: On the Floor of the 2012 RSA Security Conference

March 2nd, 2012 |
Inertia: On the Floor of the 2012 RSA Security Conference

IT Security: Defending against intrusion was a hot topic at previous RSA conferences. But users are using their devices outside the network perimeter of their organizations, which exposes data like never before. In this podcast we asked several security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Editorial, Inertia: Technology News and Opinion, Security, Tech Conferences and Events Tags: , , , , , , , , , , , , , , , , , , , , ,

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.

To support this initiative, we have [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Intel IT – Protect to Enable

February 8th, 2012 |
Intel IT – Protect to Enable

Learn about Intel’s IT best practices and our new information security strategy…. a new architecture that is designed to increase productivity, agility and innovation, while actually decreasing risk. [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.
  [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,