Security tagged posts:

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness as [See the full post…]

Download Audio FileListen/download audio  

Intel Xeon Processor E5 Livecast: Trends in IT Organizations with Dell – Intel Chip Chat – Episode 186

Intel Xeon Processor E5 Livecast: Trends in IT Organizations with Dell – Intel Chip Chat – Episode 186

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive from the Intel Xeon E5 processor launch, Allyson discusses the new Dell PowerEdge server line based on the Intel Xeon processor E5 family with Brian Payne, an [See the full post…]

Download Audio FileListen/download audio  

Building a Private Cloud with Piston Enterprise OS – Intel Conversations in the Cloud – Episode 41

Building a Private Cloud with Piston Enterprise OS – Intel Conversations in the Cloud – Episode 41

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Christopher MacGowan, the CTO of Piston Cloud Computing, chats about Piston Enterprise OS, the company’s cloud OS based on OpenStack. The solution takes advantage of Intel based servers [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Cell Phones In The Fab

March 13th, 2012 |
Inside IT: Cell Phones In The Fab

IT Best Practices: Episode 20 – There’s a trend in the enterprise that challenges IT: how can we secure productivity gains by allowing employees to use smart phones for work, without compromising security or creating a huge management problem? Now [See the full post…]

Download Audio FileListen/download audio  

Enabling Emerging Enterprise Usages with Client–Aware Technologies

Enabling Emerging Enterprise Usages with Client–Aware Technologies

IT Best Practices: Many of us use a variety of devices both in our work life and personal life. Wouldn’t it be great if you could access the information you needed anywhere, anytime, and on whatever device you happened to [See the full post…]

Download PDFRead/Download PDF  

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment. To support this initiative, we have developed [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature of [See the full post…]

Download Audio FileListen/download audio  

Discussing the Convergence of Servers and Storage with EMC – Intel Conversations in the Cloud – Episode 34

December 20th, 2011 |
Discussing the Convergence of Servers and Storage with EMC – Intel Conversations in the Cloud – Episode 34

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Dave Nicholson and Gail Rutkousky from EMC’s Alliance team talk about moving towards an IT infrastructure company. They discuss standardizing on Intel architecture-based platforms, the parallelism of workloads, [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: Rethinking Information Security to Improve Business Agility

December 7th, 2011 |
IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture.

Download PDFRead/Download PDF  

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip:  The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. In [See the full post…]

Download PDFRead/Download PDF  

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

October 14th, 2011 |
Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow Project Anthology” book.

Download Video FileWatch/download video  

The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

September 26th, 2011 |
The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

In this VMworld podcast, Stu Miniman from Wikibon drops by to talk about his organization and cloud computing adoption today and in the future. Topics include simplifying the cloud, manageability, regulation, and security. See also: Intel Conversations in the Cloud

Download Audio FileListen/download audio  

Inside IT: Cloud Computing & Security

August 9th, 2011 |
Inside IT: Cloud Computing & Security

IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor of [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort [See the full post…]

Download PDFRead/Download PDF  

Intel Labs: Intel Science and Technology Center at UC Berkeley

June 7th, 2011 |
Intel Labs: Intel Science and Technology Center at UC Berkeley

The new Intel Science and Technology Center at the University of California, Berkeley will lead research into secure computing. Professor David Wagner will be the Director of the Center and he will serve as Co-Principal Investigator. Intel Senior Principal Engineer [See the full post…]

Download Video FileWatch/download video  

Access Cloud Resources with Nimbula – Intel Conversations in the Cloud #12

Access Cloud Resources with Nimbula – Intel Conversations in the Cloud #12

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Jay Judkowitz Director of Product Management at Nimbula Inc. discusses managing cloud computing resources and access to those resources across the private & public cloud. See also: Nimbula [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with Intel’s [See the full post…]

Download Audio FileListen/download audio  

Securing the Cloud with Hytrust – Intel Conversations in the Cloud #11

Securing the Cloud with Hytrust – Intel Conversations in the Cloud #11

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Hytrust CTO Hemma Prafullchandra discusses the security challanages faced by virtualized, private, andpublic cloud data centers alike and solutions for those challenges. Hyperlink Description: Hytrust Inc. Intel Cloud [See the full post…]

Download Audio FileListen/download audio  

Intel Microarchitecture (Westmere) – Intel Chip Chat – Episode 82

Intel Microarchitecture (Westmere) – Intel Chip Chat – Episode 82

Shannon Poulin previews Intel microarchitecture, codenamed Westmere. Topics covered include key features, energy efficiency, industry reaction and new security enhancements. Intel Microarchitecture Intel Chip Chat Home Page

Download Audio FileListen/download audio  

Intel Anti-Theft Technology: Day at the Beach

June 4th, 2009 |
Intel Anti-Theft Technology: Day at the Beach

Every day thousands of laptops are stolen or are lost. Most contain critical information. In this video, Intel’s Josh Hilliker gives us a demo of Intel Anti-Theft Technology. With this new “poison pill” feature, Intel can actually help prevent crime [See the full post…]

Download Video FileWatch/download video  

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 3 of 3

September 12th, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 3 of 3

This is the last in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with the Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…]

Download Video FileWatch/download video  

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 2 of 3

September 2nd, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 2 of 3

This is the second in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, principal engineer with Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with Security [See the full post…]

Download Video FileWatch/download video  

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 1 of 3

August 21st, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 1 of 3

This is the first in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with Intel’s Information Technology Group. In these videos, Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with Security [See the full post…]

Download Video FileWatch/download video  

Symantec Endpoint Management Suite 1.0

Symantec Endpoint Management Suite 1.0

Kevin Murray, Sr. Director of Endpoint Security & Management, provides an overview of Symantec Endpoint Management Suite 1.0, and how the product can help organizations secure and recover their information and manage their endpoints. For more information, visit the business [See the full post…]

Download Audio FileListen/download audio