This post is the fourth in a series exploring Phase II of the new Partner Program. Intel Security and our partners are stronger together. That’s why we’ve overhauled our Teaming Plan to reward partners who can provide business or technical expertise to an Intel Security-found deal. In addition to providing deal protection, we’ve tripled the […]

In life, there are a handful of people that each of us truly trust – and can confide in fully. And, it’s safe to say, you’ve probably taken into consideration the trustworthiness of each one of your confidants. Maybe you’ve evaluated them on their ability to keep secrets in the past or perhaps they each […]

The way parents use Twitter and the way teens use Twitter couldn’t be more different. While many parents turn to the popular social channel for business networking, teens use Twitter to simply hang out—to see and be seen. They chat, joke, banter, and of course, they love to subtweet. Subtweeting is indirectly tweeting something about […]

The good, bad, and potentially worse of critical infrastructure protection. There has been a significant post-9/11 focus on securing critical infrastructure systems – many of which pre-date the Networked Age and were potentially more vulnerable to attack that newer networked systems. Cyber-attacks on critical infrastructure systems have not yet resulted in the loss of human […]

Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies des gammes de produits Intel Security. La protection contre ce type de codes malveillants extrêment volatile nécessite une approche multi niveaux et une coordination entre les différents […]