Cyber Risk Management tagged posts:

Developing an Enterprise Social Computing Strategy

October 14th, 2010 |
Developing an Enterprise Social Computing Strategy

IT Best Practices: Intel IT is implementing an enterprise-wide social computing platform that combines professional networking tools with social media such as wikis and blogs, and integrates with existing enterprise software. Our goal is to transform collaboration across Intel, [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , ,

Prioritizing Information Security Risks with Threat Agent Risk Assessment

October 12th, 2010 |
Prioritizing Information Security Risks with Threat Agent Risk Assessment

IT Business Value: Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,

Getting Ahead of Malware

Getting Ahead of Malware

IT Best Practices: To minimize the threat posed by malicious software, or malware, making its way into the enterprise, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Managing a Global Wireless LAN

September 21st, 2010 |
Managing a Global Wireless LAN

IT Innovation: Intel IT developed a new management and support structure for wireless LANs (WLANs). We consolidated first-level support and centralized the WLAN engineer workgroup as well as device management. We manage the WLAN as an integrated service that [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,

Evaluating Thin-Client IT Security in a Changing Threat Landscape

September 19th, 2010 |
Evaluating Thin-Client IT Security in a Changing Threat Landscape

IT Client Technology: Intel IT’s security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Recent cyber-attacks on a number of high-profile targets provided added impetus to re-evaluate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , ,

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Evaluating Intel Anti-Theft Technology

IT Information Security: Intel IT recently completed a technology evaluation of Intel Anti-Theft Technology (Intel AT), available on laptop PCs with 2010 Intel Core vPro processors.

Intel AT is a hardware-based technology that can help detect theft and disable [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , ,

Alan Ross: IT Information Security Starts At Home

July 29th, 2010 |
Alan Ross: IT Information Security Starts At Home

IT Information Security: “We cannot solve security problems with technology.” That is one of the observations of Intel IT’s Alan Ross, a Senior Principal Engineer who has developed deep insights into the data security landscape over the past decade. [See the full post…]

Download Video FileWatch/download video  

Categories: Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

Deploying Full Disk Encryption to Protect the Enterprise

Deploying Full Disk Encryption to Protect the Enterprise

IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Symantec Security Trends 2008-2009

Symantec Security Trends 2008-2009

In this podcast, Symantec Technical Director, Zulfikar Ramzan, provides an overview of the key security trends from 2008, and talks about what can be expected trends for 2009.

For more information about Security Trends in 2009, visit the PR Newsroom [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Security, Symantec Tags: , , , ,

Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Security Plan – Risk Assessment, Modeling and War Gaming

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Intel IT Information Security Pro Casey Says People Throw the Bombs

September 12th, 2007 |
Intel IT Information Security Pro Casey Says People Throw the Bombs

“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , ,

Intel Research at Berkeley: Biodiversity in Computing

March 29th, 2007 |
Intel Research at Berkeley: Biodiversity in Computing

Intel Researcher Nina Taft says she was inspired by a newspaper article on how diversity in nature helps organisms thwart the threat of viruses. Her application of principles of biodiversity and her investigation into personalizing security, user by user, could [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Intel, Security, Technology Tags: , , , ,

Social Media Tools: Are People Safer Now?

March 12th, 2007 |
Social Media Tools: Are People Safer Now?

At RSA 2007 in San Francisco, network security podcaster Martin McKeay headed a series of discussions about the new tools available to consumers, and how far we’ve come. Joining McKeay are Dan Mathews and Brae Legg of Verizon Business. [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Security, Technology, Verizon Business Tags: , , , , ,

Home and Home Office Security Report

February 27th, 2007 |

This podcast highlights some of the threats and dangers Symantec reported on in January 2007 and offers suggestions on how to stay protected.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: ,

Doc Searls Hosts Mobile Identity Workshop

February 26th, 2007 |
Doc Searls Hosts Mobile Identity Workshop

In a world full of data that is quickly being accessed by mobile devices, ownership over that information — and over one’s own reputation and identity — rises in priority. Searls speaks with Jeremiah Owyang at the recent Mobile Identiy [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Security, social media, Tech Conferences and Events, Technology, Web Strategies Tags: , , ,

Symantec Blog Roundup

January 18th, 2007 |

A Symantec Security Response podcast featuring two high-profile zero day vulnerabilities affecting Microsoft and the Broadcom Wireless device driver set. This podcast features a technical discussion of the vulnerabilities and offers listeners insight on likely attack scenarios and mitigating strategies. [See the full post…]

Download Audio FileListen/download audio  

Categories: Artificial Intelligence, Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , , , , , , , ,

October Blog Roundup

December 15th, 2006 |

A Symantec Security Response podcast featuring a roundup of the top weblog postings from Symantec Security Response engineers in October. This podcast features a summary of weblogs from Jonathan Omansky, Orla Cox, Candid Wueest and Josh Harriman.

More information at: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Symantec, Technology Tags: , , , , , ,

Security Response, September Blog

October 30th, 2006 |

A Symantec Security Response podcast focused on a roundup of the latest Symantec Security Response Weblogs for September 2006. The goal of this podcast is to help you better understand some of the threats and trends that Symantec’s Security Response [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IM Threats – Part II

October 17th, 2006 |

Learn about Instant Messaging (IM) threats and what you can do to protect your working environment.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IM Threats – Part I

October 11th, 2006 |

Learn about Instant Messaging (IM) threats and what you can do to protect your working environment.

More information at:

Symantec.com [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Historical Evolution

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and the historical evolution of threats reported by Symantec over the past 4 years. The goal of this podcast is to provide the listener with an [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Future Watch

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and Symantec’s predictions on Future Threats. The goal of this podcast is to provide the listener with an overview of the some of the possible threats [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Key Findings

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and its key findings. The goal of this podcast is to provide the listener with an overview of the threats and trends covered in Symantec’s latest [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

IBM ShortCut #6: How to catch phish

September 27th, 2006 |
IBM ShortCut #6: How to catch phish

How do you figure out if legitimate-looking email is attempting to steal your personal information? ShortCuts security expert Rocky Oliver explains how to intercept a phishing attack. This week’s links: Snopes.com, a site for researching and reporting internet hoaxes, [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, IBM, Security, Symantec, Technology Tags: , , ,

Symantec Home and Home Office Security Report for July 2006

September 24th, 2006 |

A Symantec Security Response podcast focused on the Symantec Home and Home Office Security Report for July 2006. The goal of this podcast is to help you better understand some of the threats and trends identified in the report and [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , ,