Security tagged posts:

Securing the Data Center – Intel Chip Chat – Episode 324

September 23rd, 2014 |

Inside IT: Faster Threat Detection with Security Business Intelligence

September 9th, 2014 |
Inside IT: Faster Threat Detection with Security Business Intelligence

IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

Inside IT: Developing Applications With Security Built-In

August 19th, 2014 |
Inside IT: Developing Applications With Security Built-In

IT Best Practices: Episode 82 – The use of mobile devices in the enterprise – and everywhere for that matter – has increased dramatically over the past several years. This is as true at Intel as anywhere. As the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Inside IT: Intel’s Identity and Access Management Program

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , ,

Intel and Atos: The Evolution of the Enterprise Client Experience

Intel and Atos: The Evolution of the Enterprise Client Experience

Business Solutions for IT Managers: With Ultrabook devices, Intel and Atos are helping address evolving enterprise needs and providing the performance, flexibility, and mobility employees expect plus the security, manageability, connectivity, and cost-effectiveness enterprises require. [See the full post…]

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers Tags: , , , , , , , ,

Inside IT: Intel’s SaaS Security Playbook

Inside IT: Intel’s SaaS Security Playbook

IT Best Practices: Episode 78 – The SMAC stack is changing the nature of business. SMAC is Social, Mobile, Analytics, and Cloud. Advances in these areas have allowed many operations in the enterprise to move to the cloud, and [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , , ,

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Inside IT: Making It Safe for Intel to Go Fast

May 26th, 2014 |
Inside IT: Making It Safe for Intel to Go Fast

IT Best Practices: Episode 76 – The technical and organizational landscape has changed dramatically in the past few years. Organizations have a wealth of new opportunities for greater employee productivity and operational efficiency. But these opportunities, combined with an [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , ,

Security and Mobile Devices – Intel Chip Chat – Episode 303

Security and Mobile Devices – Intel Chip Chat – Episode 303

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from a recent trip to Mobile World Congress, Lianne Caetano, the Director of Mobile Product Marketing for McAfee, stops by to talk about [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Intel, Intel Chip Chat Tags: , , , , , , , , , , , ,

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

February 13th, 2014 |
Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Loretta Nierat, a Group Product Marketing Manager at McAfee, stops by to talk about the current state of security. She gives a brief [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , ,

IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

January 23rd, 2014 |

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Grove City College: Enhancing Academic Mobility

December 19th, 2013 |

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

November 6th, 2013 |

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

Inside IT: Android Devices in the BYOD Environment

October 15th, 2013 |
Inside IT: Android Devices in the BYOD Environment

IT Best Practices: Episode 60 – We’ve talked about Intel’s Bring Your Own Device program in previous podcasts. Intel enables employees to use their own smart phones, tablets, and other devices for work. Of those, about half – 20,000 [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,

Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

October 15th, 2013 |

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , , ,

SAND ART: It’s your baby, Protect it!

September 25th, 2013 |
SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.

For more information, see: intel.com/TMI [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: , , , , , , ,

Inside IT: Sharing Cyber-Threat Information

July 9th, 2013 |
Inside IT: Sharing Cyber-Threat Information

IT Best Practices: Episode 53 – Information technology is no longer simply an isolated set of machines and tools used on a narrow set of tasks. The Global Digital Infrastructure, or GDI, is a worldwide network of devices and [See the full post…]

Download Audio FileListen/download audio  

Categories: Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,