IT Information Security tagged posts:

IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
IT Business Review: Striking a balance between protection and enablement

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Intel IT recently completed a technology evaluation of Intel Anti-Theft Technology (Intel AT), available on laptop PCs with 2010 Intel Core vPro processors.

Intel AT is a hardware-based technology that can help detect theft and disable [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , ,

Alan Ross: IT Information Security Starts At Home

July 29th, 2010 |
Alan Ross: IT Information Security Starts At Home

IT Information Security: “We cannot solve security problems with technology.” That is one of the observations of Intel IT’s Alan Ross, a Senior Principal Engineer who has developed deep insights into the data security landscape over the past decade. [See the full post…]

Download Video FileWatch/download video  

Categories: Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

Deploying Full Disk Encryption to Protect the Enterprise

Deploying Full Disk Encryption to Protect the Enterprise

IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Security Plan – Risk Assessment, Modeling and War Gaming

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Intel IT Information Security Pro Casey Says People Throw the Bombs

September 12th, 2007 |
Intel IT Information Security Pro Casey Says People Throw the Bombs

“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , ,

PodTech Weekly

November 18th, 2006 |
PodTech Weekly

SAN FRANCISCO, November 18, 2006 (PodTech News) — This week saw the highly-anticipated launch of the new Sony Playstation 3. The first few buyers to get their hands on the new system waited for about 40 hours outside of the [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Technology Tags: , , ,