|
IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more [See the full post…] |
Read/Download PDF
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: Chris Sellers, Enterprise Security, information technology, Intel, Intel IT, IT Best Practices, IT Business Review, IT Business Value, IT Information Security, IT Whitepaper, IT@Intel, protect to enable
Categories: Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Alan Ross, Anti-Theft Technology, CMOS, Cyber Risk Management, Dennis Morgan, Disk Encryption, Intel, Intel AT, Intel IT, intellectual property, IT Information Security, IT Whitepaper, IT@Intel, LAN, poison pill, Recovery token, Tarun Viswanathan, Technology Evaluation, Theft Detection, VPN, vPro, WLAN
Categories: Intel, Intel IT, IT@Intel, Security Tags: Alan Ross, Cyber Risk Management, information technology, Intel IT, IT Information Security, IT security, IT Security Industry, IT Security Management, IT Security Online, IT Security Strategies, IT@Intel, network security
|
IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Employee Productifity, Full Disk Encryption, information security, Intel IT, IT Best Practices, IT Business Agility, IT Business Efficiency, IT Business Value, IT Competitive Advantage, IT Continuity, IT efficiency, IT Information Security, IT@Intel
|
Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: Cyber Risk Management, cyber terrorism, hackers, information security, Intel, IntelSecurity, IT Information Security, Matthew Rosenquist, network security, Open Port, Security risk assessments, security risk modeling, security threats, threat agent library, threat agents, Tim Casey, war games
|
“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: Cyber Risk Management, datacenter, information security, Intel, IntelSecurity, IT Information Security, Jason Lopez, Tim Casey, viruses
|
SAN FRANCISCO, November 18, 2006 (PodTech News) — This week saw the highly-anticipated launch of the new Sony Playstation 3. The first few buyers to get their hands on the new system waited for about 40 hours outside of the [See the full post…] |
Listen/download audio
|
|
Categories: Connected Social Media, PodTech News, Technology Tags: IT Information Security, IT security, Jonathan Schwartz, Playstation 3