Quantcast
Channel: Connected Social Media » Malcolm Harkins
Browsing latest articles
Browse All 18 View Live

Image may be NSFW.
Clik here to view.

Intel’s Malcolm Harkins on PC Security

Remember those old movies in which a whiz kid accidentally breaks into the network of the Strategic Air Command? Malcolm Harkins, general manager of Intel’s Information Risk and Security Group,...

View Article



Image may be NSFW.
Clik here to view.

Security with Manny and Malcolm of HP and Intel

What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization....

View Article

Image may be NSFW.
Clik here to view.

Enabling Collaboration: Intel IT

An array of tools for collaboration has emerged just in the past decade – email, instant messaging, wikis, blogs, video conferencing and social media – that we often take for granted. And hardware like...

View Article

Image may be NSFW.
Clik here to view.

Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT...

View Article

Image may be NSFW.
Clik here to view.

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation.

View Article


Image may be NSFW.
Clik here to view.

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: Intel IT Embraces Social Computing

Intel CISO, Malcolm Harkins suggests we embrace social media and social computing to reduce risk.

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: Information Security and Cloud Computing

Intel CISO, Malcolm Harkins shares his perspective on security and the cloud.

View Article


Image may be NSFW.
Clik here to view.

Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an...

View Article


Image may be NSFW.
Clik here to view.

IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving...

View Article

Image may be NSFW.
Clik here to view.

Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This...

View Article

Image may be NSFW.
Clik here to view.

Inside IT: RSA 2013

IT Best Practices: Episode 49 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this...

View Article


Image may be NSFW.
Clik here to view.

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other....

View Article

Image may be NSFW.
Clik here to view.

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security...

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his...

View Article


Image may be NSFW.
Clik here to view.

IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile...

View Article

Image may be NSFW.
Clik here to view.

IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security...

View Article
Browsing latest articles
Browse All 18 View Live




Latest Images