What’s All This Twittering About?
Biz Stone, Co-Founder of Twitter talks about the social networking and micro-blogging service’s runaway success, and how marketers can leverage this new tool. Speaking to Jennifer Jones, Biz describes...
View ArticleGoogle’s deputy general counsel Nicole Wong talks about privacy
Nicole Wong, Google’s deputy general counsel in charge of compliance, is the point person for growing criticism of Google’s privacy practices. More than two dozen European privacy regulators have...
View ArticleIs Data Privacy the Next Electronic Border?
Join BearingPoint managing director Warren Zafrin to explore how the Internet’s ability to allow information to flow freely between countries has become the electronic border that will expand or...
View ArticleFuture Lab: Protecting Privacy, Making the Invisible Visible
A seamless and ubiquitous computing experience on the Internet also requires the user to take on a certain amount of risk that personal information would get into the wrong hands. Computer scientists...
View ArticleIT Best Practices: Security Solutions Enabled by Intel vPro Technology
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system...
View ArticleCory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”
In this episode of The Tomorrow Project: Science Fiction author, Cory Doctorow and Intel Futurist, Brian David Johnson discuss Cory’s “Knights of the Rainbow Table” story included in the new “Tomorrow...
View ArticleIT Best Practices: Protecting the Perimeter
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to...
View ArticleIT Best Practices: The 21st Century CISO (Chief Information Security Officer)
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving...
View ArticleSAND ART: It’s your baby, Protect it!
Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both. For more information, see: intel.com/TMI
View ArticleIT Best Practices: Rethink Privacy
IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design,...
View ArticleThe Cloud, Wearables, and Privacy…Oh My! – Intel Chip Chat – Episode 274
In this Intel Chip Chat audio podcast with Allyson Klein: Ben Kepes, the founder of Diversity Limited and Reuven Cohen, chief cloud advocate at Citrix join the IDF livecast for a wide-ranging...
View ArticleIT Best Practices: The Polarity of Security and Privacy
IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other....
View ArticleInside IT: Malcolm Harkins – Business Velocity in the Changing Security...
IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his...
View ArticleIT Best Practices: People are the Perimeter
IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile...
View ArticleIT Best Practices: You Are The Security Perimeter
IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed...
View ArticleInside IT: A Principles-Based Approach to Privacy at Intel
IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a...
View ArticleBig Data: Rethink Privacy
IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting...
View Article
More Pages to Explore .....