Security channel:

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip: The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

September 26th, 2011 |
The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

In this VMworld podcast, Stu Miniman from Wikibon drops by to talk about his organization and cloud computing adoption today and in the future. Topics include simplifying the cloud, manageability, regulation, and security.

See also:
Intel Conversations in the Cloud [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel Conversations in the Cloud, Security, VMware Tags: , , , , , , , , , , , , ,

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |

Inside IT: Cloud Computing & Security

August 9th, 2011 |
Inside IT: Cloud Computing & Security

IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

The Tomorrow Project: Computer Security

The Tomorrow Project: Computer Security

In this episode of The Tomorrow Project: Brian David Johnson, Futurist at Intel Corporation, interviews Tadayoshi Kohno about embedded computational devices and security.

Kohno, a scientist and researcher at the University of Washington, studies how everyday devices around us [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Intel, Security, The Tomorrow Project, Video Podcast Tags: , , , , , , , , , , ,

IT Best Practices: Information Security and Cloud Computing

IT Best Practices: Intel IT Embraces Social Computing

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , ,

Intel IT Best Practices: Rethinking Information Security with Intel CISO

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation. [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson Intel Director of Xeon Platform Marketing, Intel Rock Star, and frequent Intel Chip Chat guest discusses security, embedded encryption, trust and cloud computing trends.

See also:
The [See the full post…]

Download Audio FileListen/download audio  

Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time.

See also:
IT Center
Open Port [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Getting Ahead of Malware

Getting Ahead of Malware

IT Best Practices: To minimize the threat posed by malicious software, or malware, making its way into the enterprise, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Evaluating Thin-Client IT Security in a Changing Threat Landscape

September 19th, 2010 |
Evaluating Thin-Client IT Security in a Changing Threat Landscape

IT Client Technology: Intel IT’s security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Recent cyber-attacks on a number of high-profile targets provided added impetus to re-evaluate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , ,

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Intel IT recently completed a technology evaluation of Intel Anti-Theft Technology (Intel AT), available on laptop PCs with 2010 Intel Core vPro processors.

Intel AT is a hardware-based technology that can help detect theft and disable [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , ,

Alan Ross: IT Information Security Starts At Home

July 29th, 2010 |
Alan Ross: IT Information Security Starts At Home

IT Information Security: “We cannot solve security problems with technology.” That is one of the observations of Intel IT’s Alan Ross, a Senior Principal Engineer who has developed deep insights into the data security landscape over the past decade. [See the full post…]

Download Video FileWatch/download video  

Categories: Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

Deploying Full Disk Encryption to Protect the Enterprise

Deploying Full Disk Encryption to Protect the Enterprise

IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Symantec Security Trends 2008-2009

Symantec Security Trends 2008-2009

In this podcast, Symantec Technical Director, Zulfikar Ramzan, provides an overview of the key security trends from 2008, and talks about what can be expected trends for 2009.

For more information about Security Trends in 2009, visit the PR Newsroom [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Security, Symantec Tags: , , , ,

Intel Research at Berkeley: Biodiversity in Computing

March 29th, 2007 |
Intel Research at Berkeley: Biodiversity in Computing

Intel Researcher Nina Taft says she was inspired by a newspaper article on how diversity in nature helps organisms thwart the threat of viruses. Her application of principles of biodiversity and her investigation into personalizing security, user by user, could [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Intel, Security, Technology Tags: , , , ,

Social Media Tools: Are People Safer Now?

March 12th, 2007 |
Social Media Tools: Are People Safer Now?

At RSA 2007 in San Francisco, network security podcaster Martin McKeay headed a series of discussions about the new tools available to consumers, and how far we’ve come. Joining McKeay are Dan Mathews and Brae Legg of Verizon Business. [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Security, Technology, Verizon Business Tags: , , , , ,

Home and Home Office Security Report

February 27th, 2007 |

This podcast highlights some of the threats and dangers Symantec reported on in January 2007 and offers suggestions on how to stay protected.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: ,

Doc Searls Hosts Mobile Identity Workshop

February 26th, 2007 |
Doc Searls Hosts Mobile Identity Workshop

In a world full of data that is quickly being accessed by mobile devices, ownership over that information — and over one’s own reputation and identity — rises in priority. Searls speaks with Jeremiah Owyang at the recent Mobile Identiy [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Security, social media, Tech Conferences and Events, Technology, Web Strategies Tags: , , ,

Symantec Blog Roundup

January 18th, 2007 |

A Symantec Security Response podcast featuring two high-profile zero day vulnerabilities affecting Microsoft and the Broadcom Wireless device driver set. This podcast features a technical discussion of the vulnerabilities and offers listeners insight on likely attack scenarios and mitigating strategies. [See the full post…]

Download Audio FileListen/download audio  

Categories: Artificial Intelligence, Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , , , , , , , ,