Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Inside IT - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature of the bad guys has changed too. Considering all the possible security threats can be a bit overwhelming – it’s a big job. Malcolm Harkins takes on that job at Intel. He’s Vice President of their Information Technology Group, and Chief Information Security Officer for the company. In this podcast he discusses the ever-changing security landscape, and Intel’s approach to addressing new and changing threats.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , ,
 
Posted in: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.

 

Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.