Malcolm Harkins tagged posts:

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Inside IT: RSA 2013

May 14th, 2013 |

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Information Security and Cloud Computing

IT Best Practices: Intel IT Embraces Social Computing

Intel IT Best Practices: Rethinking Information Security with Intel CISO

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation. [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , ,

Enabling Collaboration: Intel IT

April 19th, 2011 |
Enabling Collaboration: Intel IT

An array of tools for collaboration has emerged just in the past decade – email, instant messaging, wikis, blogs, video conferencing and social media – that we often take for granted. And hardware like laptops, smart phones, mids and tablets [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , ,

Security with Manny and Malcolm of HP and Intel

October 25th, 2007 |
Security with Manny and Malcolm of HP and Intel

What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization. They also discuss, with PodTech’s Jason Lopez, coping with zero-day threats [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, HPE - Hewlett Packard Enterprise, InfoWorld, Intel, Intel-OpenPort Tags: , , , , , , , , ,

Intel’s Malcolm Harkins on PC Security

August 24th, 2007 |
Intel’s Malcolm Harkins on PC Security

Remember those old movies in which a whiz kid accidentally breaks into the network of the Strategic Air Command? Malcolm Harkins, general manager of Intel’s Information Risk and Security Group, remembers the 80s, when hackers broke in with cracked passwords. [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , ,