Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Christmas, Cyber Risk Management, Cybercriminals, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, IT@Intel Technology Tips, Scams, Security, theft, X-Mas, Xmas
Categories: Audio Podcast, Cloud Computing, Intel Conversations in the Cloud, Security, VMware Tags: Allyson Klein, applications, Cloud Computing, Conversations in the Cloud, Cyber Risk Management, data center, Intel, manageability, reliability, Security, server, Stu Miniman, VMworld, Wikibon
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: 9/11, Brad Ellison, Business Continuity, cyber attacks, Cyber Risk Management, data security, disaster preparedness, FEMA, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel
|
IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Alan Ross, Cyber Risk Management, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT Cloud Computing, IT infrastructure, IT@Intel, mobility, Security, virtualization
|
IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, mobile security, mobility
|
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
|
In this episode of The Tomorrow Project: Brian David Johnson, Futurist at Intel Corporation, interviews Tadayoshi Kohno about embedded computational devices and security.
Kohno, a scientist and researcher at the University of Washington, studies how everyday devices around us [See the full post…] |
Watch/download video
|
|
Categories: HD Video, Intel, Security, The Tomorrow Project, Video Podcast Tags: Brian David Johnson, Car Security, Car Technology, Cyber Risk Management, Futurist, Intel, Medical Security, Medical Technology, Medicine, Tadayoshi Kohno, The Tomorrow Project, University of Washington
Categories: Cloud Computing, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: Cloud Computing, Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, Malcolm Harkins
Categories: Information Technology, Intel, Intel IT, IT@Intel, Research@Intel, Security, social media, Video Podcast Tags: Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins, Social Computing, social media, Technology
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Enterprise Security, information security, Intel IT, IT Best Practices, IT Business Value, IT Consumerization
Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: CISO, Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: CISO, Cyber Risk Management, Enterprise Security management, information security, Intel IT, IT Best Practices, IT Business Value, Malcolm Harkins
Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: AES-NI, Allyson Klein, Cloud Computing, Cyber Risk Management, Dylan Larson, encryption, Intel, Intel Chip Chat, Xeon
Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel, Intel Active Management Technology, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, Matt Bodin, Passwords
|
IT Best Practices: To minimize the threat posed by malicious software, or malware, making its way into the enterprise, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Employee Productivity, information security, Intel IT, IT Best Practices, IT Business Agility, IT Business Efficiency, IT Business Value, IT Competitive Advantage, IT Continuity, IT efficiency, IT Innovation, IT@Intel
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Client Technology, Cyber Risk Management, Employee Productivity, information security, Intel IT, IT Best Practices, IT Business Agility, IT Business Efficiency, IT Business Value, IT Client Technology, IT Competitive Advantage, IT Continuity, IT efficiency, IT security, IT@Intel
Categories: Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Alan Ross, Anti-Theft Technology, CMOS, Cyber Risk Management, Dennis Morgan, Disk Encryption, Intel, Intel AT, Intel IT, intellectual property, IT Information Security, IT Whitepaper, IT@Intel, LAN, poison pill, Recovery token, Tarun Viswanathan, Technology Evaluation, Theft Detection, VPN, vPro, WLAN
Categories: Intel, Intel IT, IT@Intel, Security Tags: Alan Ross, Cyber Risk Management, information technology, Intel IT, IT Information Security, IT security, IT Security Industry, IT Security Management, IT Security Online, IT Security Strategies, IT@Intel, network security
|
IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Employee Productifity, Full Disk Encryption, information security, Intel IT, IT Best Practices, IT Business Agility, IT Business Efficiency, IT Business Value, IT Competitive Advantage, IT Continuity, IT efficiency, IT Information Security, IT@Intel
|
Intel Researcher Nina Taft says she was inspired by a newspaper article on how diversity in nature helps organisms thwart the threat of viruses. Her application of principles of biodiversity and her investigation into personalizing security, user by user, could [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Intel, Security, Technology Tags: biodiversity, Cyber Risk Management, Intel, Jason Lopez, Nina Taft
|
At RSA 2007 in San Francisco, network security podcaster Martin McKeay headed a series of discussions about the new tools available to consumers, and how far we’ve come. Joining McKeay are Dan Mathews and Brae Legg of Verizon Business. [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Security, Technology, Verizon Business Tags: Brae Legg, Cyber Risk Management, Dan Mathews, Martin McKeay, RSA 2007, Verizon Business
|
In a world full of data that is quickly being accessed by mobile devices, ownership over that information — and over one’s own reputation and identity — rises in priority. Searls speaks with Jeremiah Owyang at the recent Mobile Identiy [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Security, social media, Tech Conferences and Events, Technology, Web Strategies Tags: Berkman Center, Cyber Risk Management, Jeremiah Owyang, Mobile Identiy Workshop
|
A Symantec Security Response podcast featuring two high-profile zero day vulnerabilities affecting Microsoft and the Broadcom Wireless device driver set. This podcast features a technical discussion of the vulnerabilities and offers listeners insight on likely attack scenarios and mitigating strategies. [See the full post…] |
Listen/download audio
|
|
Categories: Artificial Intelligence, Connected Social Media, Corporate, Security, Symantec, Technology Tags: Broadcom Wireless, Cyber Risk Management, Dave Cole, Microsoft, Orlando Padilla, Patrick Fitzgerald, Security, Symantec, Symantec Security Response, Zulfikar Ramzan