Intel’s Approach to Security – Conversations in the Cloud – Episode 247

Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel Conversations in the Cloud - iTunes | Spotify | RSS Feed | Email
 

Intel’s Tom Garrison and Camille Morhardt join host Jake Smith in a special episode to talk about today’s security landscape. The three discuss Intel’s approach to security from hardware to software, finding vulnerabilities, and engineering mitigations. They also talk about emerging areas, such as AI, blockchain, IoT and edge devices, and more. Tom and Camille go into detail about the future of security and the wider technology industry.

Listen to Tom and Camille’s security-focused podcast at:
intel.com/cybersecurityinside

Follow Tom on Twitter at: twitter.com/tommgarrison
Follow Camille on Twitter at: twitter.com/morhardt
Follow Jake on Twitter at: twitter.com/jakesmithintel

Tags: , , , , , , , , , , ,
 
Posted in: Audio Podcast, Intel, Intel Conversations in the Cloud, Security