IntelSecurity tagged posts:

Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Security Plan – Risk Assessment, Modeling and War Gaming

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Security with Manny and Malcolm of HP and Intel

October 25th, 2007 |
Security with Manny and Malcolm of HP and Intel

What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization. They also discuss, with PodTech’s Jason Lopez, coping with zero-day threats ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, HPE - Hewlett Packard Enterprise, InfoWorld, Intel, Intel-OpenPort Tags: , , , , , , , , ,

IT@Intel: Return on Security Investment

October 5th, 2007 |
IT@Intel: Return on Security Investment

Matt Rosenquist, Information Security Strategist at Intel, says that measuring success in the security industry is difficult, since there isn’t a perfect tool for measuring what doesn’t happen. In this podcas talks about how he approaches a nascent practice like ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , ,

Intel IT Information Security Pro Casey Says People Throw the Bombs

September 12th, 2007 |
Intel IT Information Security Pro Casey Says People Throw the Bombs

“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , ,

Intel’s Malcolm Harkins on PC Security

August 24th, 2007 |
Intel’s Malcolm Harkins on PC Security

Remember those old movies in which a whiz kid accidentally breaks into the network of the Strategic Air Command? Malcolm Harkins, general manager of Intel’s Information Risk and Security Group, remembers the 80s, when hackers broke in with cracked passwords. ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , ,

IT Pros Finding Reliable, Remote Security and Manageability for Business Laptops, 24/7

June 8th, 2007 |
IT Pros Finding Reliable, Remote Security and Manageability for Business Laptops, 24/7

In this Intel podcast, Matt Trevorrow and Jeff Wade of IT-outsourcing firm EDS explain how Intel’s vPro and Centrino Pro technology together are making the three million desktop and laptop computers they manage worldwide more secure, and more manageable. ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Intel, Intel vPro, IntelBusiness Tags: , , , , , , , , ,