privacy tagged posts:

Big Data: Rethink Privacy

Big Data: Rethink Privacy

IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in [See the full post…]

Download Video FileWatch/download video  

Categories: Big Data, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , , , , , , , ,

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

The Cloud, Wearables, and Privacy…Oh My! – Intel Chip Chat – Episode 274

October 23rd, 2013 |
The Cloud, Wearables, and Privacy…Oh My! – Intel Chip Chat – Episode 274

In this Intel Chip Chat audio podcast with Allyson Klein: Ben Kepes, the founder of Diversity Limited and Reuven Cohen, chief cloud advocate at Citrix join the IDF livecast for a wide-ranging discussion on the interesting developments at the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: , , , , , , , , , , ,

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , , ,

SAND ART: It’s your baby, Protect it!

September 25th, 2013 |
SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.

For more information, see: intel.com/TMI [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

October 14th, 2011 |

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Future Lab: Protecting Privacy, Making the Invisible Visible

November 29th, 2010 |
Future Lab: Protecting Privacy, Making the Invisible Visible

A seamless and ubiquitous computing experience on the Internet also requires the user to take on a certain amount of risk that personal information would get into the wrong hands. Computer scientists are developing tools that protect a user’s privacy. [See the full post…]

Download Audio FileListen/download audio  

Categories: Future Lab Radio, Intel, Intel Free Press, Intel Labs, Research@Intel Tags: , , , , , , , , , , , , , , ,

Is Data Privacy the Next Electronic Border?

February 1st, 2008 |
Is Data Privacy the Next Electronic Border?

Join BearingPoint managing director Warren Zafrin to explore how the Internet’s ability to allow information to flow freely between countries has become the electronic border that will expand or contract depending on the privacy borders.

In 1995, Europe established a [See the full post…]

Download Audio FileListen/download audio  

Categories: BearingPoint, Connected Social Media, Corporate Tags: , ,

Google’s deputy general counsel Nicole Wong talks about privacy

Google’s deputy general counsel Nicole Wong talks about privacy

Nicole Wong, Google’s deputy general counsel in charge of compliance, is the point person for growing criticism of Google’s privacy practices. More than two dozen European privacy regulators have launched an inquiry into Google’s data protection practices. In the United [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Enterprise 2.0, Inside Silicon Valley Tags: , , , , ,

What’s All This Twittering About?

May 20th, 2007 |
What’s All This Twittering About?

Biz Stone, Co-Founder of Twitter talks about the social networking and micro-blogging service’s runaway success, and how marketers can leverage this new tool. Speaking to Jennifer Jones, Biz describes how people are using Twitter, and answers Marketing Voices viewers’ questions [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Marketing Voices, social media Tags: , ,