 |
IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in a ... [see the full post] |
Watch/download video
|
|
Categories: Big Data, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Video Podcast Tags: Big Data, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, pbd, personal information, PII, privacy, privacy by design, privacy principles, Security
 |
IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. ... [see the full post] |
Listen/download audio
|
|
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, Corporate, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, principles, privacy, Security, Stuart Tyler
 |
IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. ... [see the full post] |
Watch/download video
|
|
Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, privacy, privacy principles, protect to enable, Security
 |
IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social ... [see the full post] |
Watch/download video
|
|
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
 |
IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer ... [see the full post] |
Listen/download audio
|
|
Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, Big Data, Chief Privacy Officer, Chief Security Officer, Corporate, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins, privacy, Security, velocity
 |
IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ... [see the full post] |
Watch/download video
|
|
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, governance, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
 |
In this Intel Chip Chat audio podcast with Allyson Klein: Ben Kepes, the founder of Diversity Limited and Reuven Cohen, chief cloud advocate at Citrix join the IDF livecast for a wide-ranging discussion on the interesting developments at the show ... [see the full post] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: Allyson Klein, Ben Kepes, Chip Chat, Cloud Computing, Diversity Limited, IDF, Intel, Internet of Things, podcast, privacy, Reuven Cohen, Wearables
 |
IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs ... [see the full post] |
Watch/download video
|
|
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: information technology, Intel, Intel Corporate Privacy Rules, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, pbd, personal information, PII, privacy, privacy by design, privacy principles, protect to enable, Security
 |
Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.
For more information, see: intel.com/TMI
|
Watch/download video
|
|
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: children, IP, privacy, Security, Shubhada Sahasrabudhe, silicon, Technology
 |
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins
As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of ... [see the full post] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Chief Information Security Officer, CISO, Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
 |
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins
At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web ... [see the full post] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
 |
In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow Project Anthology” book.
|
Watch/download video
|
|
Categories: HD Video, Intel, The Tomorrow Project Tags: Brian David Johnson, Computer Science, Cory Doctorow, encryption, Futurist, privacy, rainbow table, Science, science fiction, science fiction writer, Security, Society, Technology, technology activist, wireless networks
 |
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort ... [see the full post] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
 |
A seamless and ubiquitous computing experience on the Internet also requires the user to take on a certain amount of risk that personal information would get into the wrong hands. Computer scientists are developing tools that protect a user’s privacy. ... [see the full post] |
Listen/download audio
|
|
Categories: Future Lab Radio, Intel, Intel Free Press, Intel Labs, Research@Intel Tags: Future Lab, Institute for the Future, Intel, Intel Free Press, Intel Labs, IntelFreePress, Jaeyeon Jung, Mike Liebhold, Miro Enev, privacy, Private Information, Research, Research@Intel, Sophia Wang, Sunny Consolvo, University of Washington
 |
Join BearingPoint managing director Warren Zafrin to explore how the Internet’s ability to allow information to flow freely between countries has become the electronic border that will expand or contract depending on the privacy borders.
In 1995, Europe established a privacy ... [see the full post] |
Listen/download audio
|
|
Categories: BearingPoint, Connected Social Media, Corporate Tags: BearingPoint, privacy, Warren Zafrin
 |
Nicole Wong, Google’s deputy general counsel in charge of compliance, is the point person for growing criticism of Google’s privacy practices. More than two dozen European privacy regulators have launched an inquiry into Google’s data protection practices. In the United ... [see the full post] |
Watch/download video
|
|
Categories: Connected Social Media, Enterprise 2.0, Inside Silicon Valley Tags: compliance, DoubleClick, Google, Mercury News, Nicole Wong, privacy
 |
Biz Stone, Co-Founder of Twitter talks about the social networking and micro-blogging service’s runaway success, and how marketers can leverage this new tool. Speaking to Jennifer Jones, Biz describes how people are using Twitter, and answers Marketing Voices viewers’ questions ... [see the full post] |
Watch/download video
|
|
Categories: Connected Social Media, Marketing Voices, social media Tags: Biz Stone, Jennifer Jones, privacy