Intel’s Malcolm Harkins on PC Security
Remember those old movies in which a whiz kid accidentally breaks into the network of the Strategic Air Command? Malcolm Harkins, general manager of Intel’s Information Risk and Security Group,...
View ArticleSecurity with Manny and Malcolm of HP and Intel
What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization....
View ArticleEnabling Collaboration: Intel IT
An array of tools for collaboration has emerged just in the past decade – email, instant messaging, wikis, blogs, video conferencing and social media – that we often take for granted. And hardware like...
View ArticleInside IT: Security
IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT...
View ArticleIntel IT Best Practices: Intel CISO Discusses Misperception of Risk
Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation.
View ArticleIntel IT Best Practices: Rethinking Information Security with Intel CISO
In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that...
View ArticleIT Best Practices: Intel IT Embraces Social Computing
Intel CISO, Malcolm Harkins suggests we embrace social media and social computing to reduce risk.
View ArticleIT Best Practices: Information Security and Cloud Computing
Intel CISO, Malcolm Harkins shares his perspective on security and the cloud.
View ArticleInside IT: Stopping Viruses and Threats
IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an...
View ArticleIT Best Practices: Protecting the Perimeter
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to...
View ArticleIT Best Practices: The 21st Century CISO (Chief Information Security Officer)
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving...
View ArticleInside IT: Security and Business Intelligence
IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This...
View ArticleInside IT: RSA 2013
IT Best Practices: Episode 49 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this...
View ArticleIT Best Practices: The Polarity of Security and Privacy
IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other....
View ArticleInside IT: Malcolm Harkins – Business Velocity in the Changing Security...
IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his...
View ArticleIT Best Practices: People are the Perimeter
IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile...
View ArticleIT Best Practices: The Security Poverty Line
IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity...
View ArticleInside IT: Talking About Security by Design at RSA 2014
IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security...
View Article
More Pages to Explore .....