|
Cybercrime has become a sophisticated enterprise. Hacking tools built on the latest technologies such as AI or hybrid cloud are available on the black market, where stolen data is also bought and sold. And digital tools used in cinema have [See the full post…] |
Listen/download audio 23:53
|
|
Categories: Artificial Intelligence, Audio Podcast, Security, Technology, This Moment Matters Tags: AI, cyber risk, cyber-threat, cybercrime, Cybersecurity, decryption, deep fake, encryption, Hybrid Cloud, insurance, malware, Marsh, Marsh McLennan, NIST Framework, ransomware, social engineering, Stephen Viña
|
IT Best Practices: Sensor data and analytics, powered by a robust Industrial Internet of Things (IIoT) solution can help manufacturers gain actionable insights into the behavior and performance of their tools in real time. With earlier and more accurate [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: data guard, Data Protection, encryption, enhanced data encryption, IIoT, Industrial Internet of Things, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, machine learning, pdf
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: Allyson Klein, Audio Podcast, chain of trust, Chip Chat, Cloud Security Solutions, encryption, Intel, OpenStack, OpenStack Summit Tokyo, Ravi Varanasi, Security Innovation
|
Intelligent Networking: Intel QuickAssist Technology (Intel QAT) offers encryption/decryption and compression/decompression acceleration to developers, enterprises and cloud service providers with APIs, add-in cards or chipset for increased performance and security. [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel: Intelligent Networking, Intel: Software Defined Infrastructure Tags: Compression, encryption, Intel, Intel QAT, Intel QuickAssist Technology, Intelligent Networking, Open SSL, SDI, SDN, Security, Software Defined Networking, Software-defined infrastructure, SSL
|
IT Best Practices:
Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated [See the full post…] |
Read/Download PDF
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Data Protection, encryption, Enterprise Security, Intel IT, Intel Solid-State Drives, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, McAfee Drive Encryption, McAfee ePolicy Orchestrator, SEDs, SSD
Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Audio Podcast, Corporate, Efi Kaufman, encryption, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, McAfee Drive Encryption, Oded Bar-El, Security
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: Advanced Encryption Standard New Instructions, AES-NI, Business Solutions for IT Managers, decryption, DuPont, encryption, high performance computing, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
|
IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, information security, Intel IT, Intel vPro Technology, IT Best Practices, IT@Intel, Solid State Drives, SSD
Categories: HD Video, Intel, The Tomorrow Project Tags: Brian David Johnson, Computer Science, Cory Doctorow, encryption, Futurist, privacy, rainbow table, Science, science fiction, science fiction writer, Security, Society, Technology, technology activist, wireless networks
|
IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, mobile security, mobility
|
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: AES-NI, Allyson Klein, Cloud Computing, Cyber Risk Management, Dylan Larson, encryption, Intel, Intel Chip Chat, Xeon
Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel, Intel Active Management Technology, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, Matt Bodin, Passwords
|
In his keynote today at the Intel Developer Forum in San Francisco, Patrick Gelsinger, senior vice president and general manager of Intel’s Digital Enterprise Group, gave a broad update on Intel’s efforts this year.
In this podcast, Gelsinger covers what [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel Developer Forum, Intel IT, Intel Nehalem, IT@Intel Tags: 45 nanometer, Danbury technology, decryption, Digital Enterprise Group, dual processor, encryption, Intel Developer Forum, John Fowler, Lead-Free, McCreary, microarchitecture, Moore's Law, Nehalem, Patrick Gelsinger, virtualization, vPro
|
SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego.
In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, SNWSpotlight Tags: China, encryption, HP, HPE, LSI, SAS, Seagate, Security, SNW Spotlight, Storage Networking World