data security tagged posts:

Cohesity CEO Sanjay Poonan AI-powered Data security

August 11th, 2025 |
Cohesity CEO Sanjay Poonan AI-powered Data security

In this video, Cohesity CEO Sanjay Poonan tells The Forecast about advice he got from Nvidia CEO Jensen Huang that led him on a journey to build a multi-billion-dollar, AI-powered data security company. Find more enterprise cloud news, features stories [See the full post…]

Download Video FileWatch/download video 4:28  

Why Security is Priority Number One for Any Cloud Service

October 22nd, 2019 |
Why Security is Priority Number One for Any Cloud Service

With the average cost of a data breach for a company now at $3.8 million and the emergence of regulations like GDPR and the CCPA, businesses have more than customer distrust to contend with if their data is not properly [See the full post…]

Download Audio FileListen/download audio  

HyTrust, IBM and Intel Remove Security Barriers for Cloud Adoption – Intel Chip Chat – Episode 535

HyTrust, IBM and Intel Remove Security Barriers for Cloud Adoption – Intel Chip Chat – Episode 535

In this Intel Chip Chat audio podcast with Allyson Klein: Bill Hackenberger, Vice President of Data Security at HyTrust, joins us to talk about security with virtualization and across cloud environments. HyTrust has been securing virtualized environments for enterprises since [See the full post…]

Download Audio FileListen/download audio  

Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

September 2nd, 2015 |
Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

In this Intel Chip Chat audio podcast with Allyson Klein: Alan Ross, Senior Principal Engineer at Intel outlines how quickly the amount of data that enterprises deal with is scaling from millions to tens of billions and how gaining actionable [See the full post…]

Download Audio FileListen/download audio  

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Intel Chip Chat: Network Insights: Edward Pullin, Product Line Manager at Intel, stops by to discuss Intel QuickAssist Acceleration Technology for security and compression. He describes how the technology is helping Telecommunication organizations secure their data whether in motion or [See the full post…]

Download Audio FileListen/download audio  

Fujitsu Spain: Revolutionizing Public Administration

Fujitsu Spain: Revolutionizing Public Administration

Business Solutions for IT Managers: Fujitsu Spain makes the most of the Intel vPro platform for optimum data security, remote management, and energy efficiency.

Download PDFRead/Download PDF  

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social [See the full post…]

Download Video FileWatch/download video  

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief [See the full post…]

Download Video FileWatch/download video  

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |
Inside IT: Disaster Preparedness for the Data Center

IT Best Practices: Episode 8 – With the ten-year anniversary of 9-11, we’re reminded of the importance of being prepared for disaster and how that day changed the way many IT professionals view data security. With Texas fires and Hurricane [See the full post…]

Download Audio FileListen/download audio  

Vision 2008 Podcast: Next Generation Data Protection

Vision 2008 Podcast: Next Generation Data Protection

In this podcast, Matt Kixmoeller, VP of Product Management for Veritas NetBackup and Pat Hanavan, VP of Product Management for Backup Exec, have a high-level discussion around Symantec’s Next Generation Data Protection strategy. For more information, visit the business section [See the full post…]

Download Audio FileListen/download audio  

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

In this podcast, Marty Ward, Director of Product Marketing in the Data Protection group, discusses the updated NetBackup platform, and how it is a part of Symantec’s Next Generation Data Protection strategy. For more information, visit the business section at [See the full post…]

Download Audio FileListen/download audio  

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint. This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…]

Download Video FileWatch/download video