|
The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…] |
Listen/download audio 16:46
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: Business Continuity, Cloud Computing, Conversations in the Cloud, cyber security, Disaster Recovery, Intel, SafeHouse Initiative
|
The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…] |
Listen/download audio 23:38
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: Business Continuity, Cloud Computing, Conversations in the Cloud, cyber security, Disaster Recovery, Intel, SafeHouse Initiative
|
The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…] |
Listen/download audio 13:48
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud, Security Tags: Audio Podcast, Business Continuity, Cloud Computing, Conversation in the Cloud, cyber security, Disaster Recovery, Intel, SafeHouse Initiative
|
IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.
See [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Big Data, cyber security, Enterprise Security, information security, information technology, Insider Threats, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, SEIM
|
IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists [See the full post…] |
Listen/download audio 6:08
|
|
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Audio Podcast, cyber security, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Security, Security Business Intelligence, threat detection, Tony Saint
Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: Alan Ross, Big Data, Cyber Risk Management, cyber security, Enterprise Security, information security, Insider Threats, IT Best Practices, IT@Intel, Security Business Intelligence, SIEM