 |
Cybercrime has become a sophisticated enterprise. Hacking tools built on the latest technologies such as AI or hybrid cloud are available on the black market, where stolen data is also bought and sold. And digital tools used in cinema have [See the full post…]
|
Listen/download audio 23:53
|
|
Categories: Artificial Intelligence, Audio Podcast, Security, Technology, This Moment Matters Tags: AI, cyber risk, cyber-threat, cybercrime, Cybersecurity, decryption, deep fake, encryption, Hybrid Cloud, insurance, malware, Marsh, Marsh McLennan, NIST Framework, ransomware, social engineering, Stephen Viña
 |
IT Best Practices: Sensor data and analytics, powered by a robust Industrial Internet of Things (IIoT) solution can help manufacturers gain actionable insights into the behavior and performance of their tools in real time. With earlier and more accurate information, [See the full post…]
|
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: data guard, Data Protection, encryption, enhanced data encryption, IIoT, Industrial Internet of Things, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, machine learning, pdf
 |
In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from OpenStack Summit Tokyo Ravi Varanasi, General Manager of Cloud Security Solutions at Intel discusses the importance of security to enable enterprise grade OpenStack. He emphasizes that [See the full post…]
|
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: Allyson Klein, Audio Podcast, chain of trust, Chip Chat, Cloud Security Solutions, encryption, Intel, OpenStack, OpenStack Summit Tokyo, Ravi Varanasi, Security Innovation
 |
Intelligent Networking: Intel QuickAssist Technology (Intel QAT) offers encryption/decryption and compression/decompression acceleration to developers, enterprises and cloud service providers with APIs, add-in cards or chipset for increased performance and security.
|
Read/Download PDF
|
|
Categories: Intel, Intel: Intelligent Networking, Intel: Software Defined Infrastructure Tags: Compression, encryption, Intel, Intel QAT, Intel QuickAssist Technology, Intelligent Networking, Open SSL, SDI, SDN, Security, Software Defined Networking, Software-defined infrastructure, SSL
 |
IT Best Practices: Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated manageability, [See the full post…]
|
Read/Download PDF
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Data Protection, encryption, Enterprise Security, Intel IT, Intel Solid-State Drives, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, McAfee Drive Encryption, McAfee ePolicy Orchestrator, SEDs, SSD
 |
IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In the [See the full post…]
|
Listen/download audio
|
|
Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Audio Podcast, Corporate, Efi Kaufman, encryption, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, McAfee Drive Encryption, Oded Bar-El, Security
 |
Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.
|
Read/Download PDF
|
|
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: Advanced Encryption Standard New Instructions, AES-NI, Business Solutions for IT Managers, decryption, DuPont, encryption, high performance computing, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
 |
IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution improves [See the full post…]
|
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, information security, Intel IT, Intel vPro Technology, IT Best Practices, IT@Intel, Solid State Drives, SSD
 |
In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow Project Anthology” book.
|
Watch/download video
|
|
Categories: HD Video, Intel, The Tomorrow Project Tags: Brian David Johnson, Computer Science, Cory Doctorow, encryption, Futurist, privacy, rainbow table, Science, science fiction, science fiction writer, Security, Society, Technology, technology activist, wireless networks
 |
IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to mitigate [See the full post…]
|
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, mobile security, mobility
 |
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort [See the full post…]
|
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
 |
In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson Intel Director of Xeon Platform Marketing, Intel Rock Star, and frequent Intel Chip Chat guest discusses security, embedded encryption, trust and cloud computing trends. See also: The Server [See the full post…]
|
Listen/download audio
|
|
Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: AES-NI, Allyson Klein, Cloud Computing, Cyber Risk Management, Dylan Larson, encryption, Intel, Intel Chip Chat, Xeon
 |
IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time. See also: IT Center Open Port
|
Watch/download video
|
|
Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: Cyber Risk Management, encryption, Intel, Intel Active Management Technology, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, Matt Bodin, Passwords
 |
In his keynote today at the Intel Developer Forum in San Francisco, Patrick Gelsinger, senior vice president and general manager of Intel’s Digital Enterprise Group, gave a broad update on Intel’s efforts this year. In this podcast, Gelsinger covers what [See the full post…]
|
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel Developer Forum, Intel IT, Intel Nehalem, IT@Intel Tags: 45 nanometer, Danbury technology, decryption, Digital Enterprise Group, dual processor, encryption, Intel Developer Forum, John Fowler, Lead-Free, McCreary, microarchitecture, Moore's Law, Nehalem, Patrick Gelsinger, virtualization, vPro
 |
SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego. In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…]
|
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, SNWSpotlight Tags: China, encryption, HP, HPE, LSI, SAS, Seagate, Security, SNW Spotlight, Storage Networking World