xxxxxxxxxxxxxxxx

Intel Security

This user hasn't shared any profile information

Safeguarding vital data has emerged as one of the most significant threats to effective corporate process. This white paper discusses the many options...

Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere,...

Encryption solutions are a key component of data protection and are part of Intel Security protection suites. These capabilities include drive encryption,...

This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were...

Have you heard of mobile app collusion? Seemingly benign apps are working together to execute attacks.  Read this solution brief from Intel Security to...

W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. This malware allows complete control...

Endpoint defenses shouldn’t just spot trouble—they need to respond quickly and remediate threats fully. Learn why integration is essential for...

Organizations are looking to embed security into the culture and enterprise architecture of the business to ensure its resilience for the long term and...

One of the most serious security challenges facing enterprises today is that of the insider threat. The Intel Insider Threat Field Guide was designed to...

In early 2015, an Intel® Security survey of incident responders at 700 organizations uncovered the hurdles and opportunities facing investigators of targeted...