|
In this Tech Barometer podcast, explore how data management and security innovations are bringing resilience to escalating threats of data destruction and exfiltration.
Find more enterprise cloud news, features stories and profiles at The Forecast.
Transcript:
John Dodds: Data [See the full post…] |
Listen/download audio 13:49
|
|
Categories: Audio Podcast, Security, Tech Barometer - From The Forecast by Nutanix Tags: Cybersecurity, Data Protection, Nutanix, ransomware
|
The Intel Information Security proof of concept demonstrated the CrowdStrike Falcon platform can quickly identify, contain, and remediate threats.
CrowdStrike and Intel co-engineered a new, advanced memory scanning capability based on Intel TDT delivering an additional layer of defense. [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: CrowdStrike, cyberthreats, EDR, endpoint detection & response, hardware-based protection, Security
|
The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…] |
Listen/download audio 13:48
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud, Security Tags: Audio Podcast, Business Continuity, Cloud Computing, Conversation in the Cloud, cyber security, Disaster Recovery, Intel, SafeHouse Initiative
|
In this podcast segment, Tony Palmer, principal validation analyst at research firm ESG, goes beyond the metrics of testing and validating IT technologies, sharing insights on the emerging business model of a data-driven organization.
In an earlier segment with [See the full post…] |
Listen/download audio 8:41
|
|
Categories: Audio Podcast, Cloud Computing, Security, Tech Barometer - From The Forecast by Nutanix Tags: Cloud Security, Cybersecurity, ESG, Hybrid Cloud, Hybrid Multicloud Environments, Nutanix, Tony Palmer
|
In this podcast, David Hake, UC Berkeley lecturer and co-founder of Resilience Insurance, talks about the rise and spread of cyberthreats facing governments, enterprises and individuals.
“Every company has a digital footprint, every company – even Bob’s pizza around [See the full post…] |
Listen/download audio 10:34
|
|
Categories: Audio Podcast, Cloud Computing, Security, Tech Barometer - From The Forecast by Nutanix Tags: Davis Hake, hybrid multi-cloud, managing cyber risk, Nutanix, Resilience Insurance, Security
|
Rick Vanover handles product strategy at VEEAM, a backup and replication services firm. In this segment, learn about the service most companies hope they’ll never need. But Vanover says a good backup service is the best thing ever after [See the full post…] |
Listen/download audio 5:40
|
|
Categories: Audio Podcast, Security, Tech Barometer - From The Forecast by Nutanix, Technology Tags: backup and replication, digital data, ransomware, Rick Vanover, Rickatron, VEEAM
|
Cybercrime has become a sophisticated enterprise. Hacking tools built on the latest technologies such as AI or hybrid cloud are available on the black market, where stolen data is also bought and sold. And digital tools used in cinema have [See the full post…] |
Listen/download audio 23:53
|
|
Categories: Artificial Intelligence, Audio Podcast, Security, Technology, This Moment Matters Tags: AI, cyber risk, cyber-threat, cybercrime, Cybersecurity, decryption, deep fake, encryption, Hybrid Cloud, insurance, malware, Marsh, Marsh McLennan, NIST Framework, ransomware, social engineering, Stephen Viña
|
BAE Systems contracts with the U.S. Department of Defense. It’s in the difficult business of handling military and intelligence secrets. And while there is a lot the company can’t talk about, there are plenty of useful insights they can share, [See the full post…] |
Listen/download audio 10:46
|
|
Categories: Audio Podcast, Cloud Computing, Security, Tech Barometer - From The Forecast by Nutanix Tags: BAE Systems, Cloud Computing, DoD, Dr. Nandish Mattikalli, Hybrid Multicloud, Nutanix, Secure Apps, Security, U.S. Department of Defense
|
IT Best Practices: In this second video of the Path to Cloud series Phil Vokins, Cloud Services Director, Intel Americas, is joined by Shachaf Levi, Intel IT Cloud Security Architect and Sridhar Mahankali, Intel IT Principal Engineer, Network Security [See the full post…] |
Watch/download video
|
|
Categories: Cloud Computing, Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: Cloud Security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Phil Vokins, Shachaf Levi, Sridhar Mahankali
|
Intel’s Tom Garrison and Camille Morhardt join host Jake Smith in a special episode to talk about today’s security landscape. The three discuss Intel’s approach to security from hardware to software, finding vulnerabilities, and engineering mitigations. They also talk about [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Intel, Intel Conversations in the Cloud, Security Tags: AI, Blockchain, Camille Morhardt, Cloud Computing, Cloud Security, Conversations in the Cloud, edge devices, Intel, IoT, Jake Smith, Security, Tom Garrison
|
IT Best Practices: Best-in-class organizations continuously strive to innovate and improve IT assets. This transformation is critical for business organizations to perform operations without disruption. IT transformation also enhances business units’ ability to meet objectives through deeper IT asset [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: APM, Application Portfolio Management, compliance risks, Digital Acceleration, information technology, Intel, Intel IT, IT asset rationalization, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, Security, tco, Technical debt reduction, Total Cost of Ownership
Categories: Audio Podcast, Intel, Intel Conversations in the Cloud, Security Tags: Audio Podcast, Blockchain, Chip Chat, Cloud Computing, Confidential Computing, Conversation in the Cloud, Corda, Future of Security, Intel, Intel SGX, Jake Smith, R3, Richard Gendal Brown
|
With the average annual cost of a data breach for a company about to exceed $4 million and the emergence of regulations like GDPR and the CCPA, businesses more than ever must prioritize data safeguards. “If you look at enterprises, [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Security, Tech Barometer - From The Forecast by Nutanix Tags: Ben Ravani, CCPA, Cloud Security, Cybersecurity, data safeguards, GDPR, Hybrid Cloud, Nutanix, Reliability Engineering
Categories: Audio Podcast, data centers, Intel, Intel Chip Chat, Security Tags: Allyson Klein, Audio Podcast, Chip Chat, CSPs, Intel, Intel SGX, Intel Software Guard Extensions, Intel Xeon E processors, ISVs, Jim Gordon
|
IT Best Practices: Intel IT is improving Intel’s security posture with data intelligence–deploying a new Cyber Intelligence Platform (CIP) based on leading-edge technologies, including Splunk Enterprise and Apache Kafka. The new platform ingests data from hundreds of sources and [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: AI, artificial intelligence, cyber intelligence platform, Cybersecurity, Improving security posture with data intelligence, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, machine learning, pdf
Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights, Security Tags: 5G, Allyson Klein, Audio Podcast, Chip Chat, Fortinet, Intel, Network Insights, network security, network transformation, NFV, Richard Orgias, SDN, Security
Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: advanced persistent threats, Audio Podcast, Brent Conran, information technology, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, one percent, Security
|
IT@Intel Brief: Learn how Intel IT is protecting the enterprise against advanced persistent threats (APTs), using machine learning with pattern analysis and other advanced cybersecurity techniques such as honeypots, sinkholes, and Layer 7 monitoring. [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: advanced persistent threat, APT, APTs, Cybersecurity, honeypots, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Layer 7 monitoring, machine learning, pdf, sinkholes
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud, Security Tags: Audio Podcast, Chip Chat, Cloud Computing, Conversation in the Cloud, Cybersecurity, Intel, Intel Select Solutions, Lisa Davis, Lockheed Martin, Security, Sensitive Data
|
In this episode of Intel Chip Chat, Anand Kashyap, CTO and Co-Founder of Fortanix, joins us to talk about their mission to solve for security and privacy in the cloud. Anand talks about how Fortanix believes the best security for [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: Anand Kashyap, EDP, Enclave Development Program, Fortanix, hardware security, Intel SGX, Intel Software Guard Extensions, Java, Python, RSA, Runtime Encryption
Categories: Audio Podcast, data centers, Intel, Intel Chip Chat, Security Tags: Allyson Klein, Audio Podcast, Chip Chat, data center security, Intel, Intel AES-NI, Intel Key Protection Technology, Intel KPT, Intel QAT, Intel QuickAssist Technology, Intel Xeon Scalable, Jesse Schrater
Categories: Audio Podcast, data centers, Intel, Intel Chip Chat, Security Tags: 5G, Allyson Klein, Audio Podcast, Chip Chat, dataplane optimization, Gabriele di Piazza, Intel, Intel Xeon Scalable processors, John Healy, Network Functions Virtualization, NFV, Open Standards, SDN, software-defined data centers, Telco NFV, VMware
|
IT Best Practices: IT departments everywhere face what appears to be conflicting business needs: the need to take advantage of the agility and technology provided by the public cloud and the need to keep proprietary information secure.
Recently, Intel [See the full post…] |
Read/Download PDF
|
|
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Security, IaaS, IaaS security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, PaaS, pdf, Public Cloud, security as a service, software-defined security
Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights, Security Tags: Allyson Klein, Audio Podcast, Chip Chat, Intel, Lanner Electronica, Network Insights, network security, network transformation, Sven Freudenfeld