Speaking at RSA
I will be speaking at this year’s RSA Conference, discussing how hardware-based security is, and will continue to be, instrumental in defending against emerging threats and how Intel will continue to invest in this area.
The RSA Conference is arguably the most attended annual cybersecurity gathering and Intel looks forward to being part of the event. This year, we are getting a chance to speak directly to security enthusiasts at a special lunch session on Wednesday, February 15th at the Intel REcharge Lounge. Join me at 12:30 p.m. for a light lunch and a great discussion.
Technology is advancing rapidly and so are the threats, meaning that protective software alone will not suffice. Security will require every possible advantage to keep pace with the emerging threats. Hardware will be a powerful ally from the proper design fundamentals to embedded features that software can leverage to increase security, safety, and privacy. With that in mind, Intel is stepping up and encouraging other technology firms to do the same, so make sure to come register for this session.
The Three Pillars of Value Proposition
In one of my previous blogs, I outlined the all-important balancing act that goes into creating any successful security program. For a security feature to be effective, it needs to reduce the risks to security, safety, and privacy while not impeding the user experience, and come in at a reasonable overall cost. These are the aspects that should drive the designs of future technology to enhance security.
Though it’s a challenge, security savvy organizations have shown that these pillars can function in harmony, as Intel’s efforts have recently demonstrated. We’ve shown that the customer’s needs must be met at a price they can afford and in a way that does not detract from their computing experience.
Hardware, the Final Frontier
For every device that computes, hardware is at its core. Firmware, operating systems, and applications all rely on the hardware. This is an advantageous position for threat monitoring and providing deeply entrenched protections. It is also the place most difficult for attackers to compromise and maintains the best visibility of the system. The time is now for the technology industry to use this resource. Come to my talk so we can describe our current thinking and get your always valuable feedback.
Intel is Stepping Up
Intel is synonymous with computing. We have a vested interest to make sure that confidence in technology remains strong and impediments such as cyber-attacks are not detrimental to the experiences that connect and enrich the lives of users.
Will security become such a barrier to technology adoption? Not if the leading companies work collectively to create more secure products and services. Cybersecurity is a critical issue, and technology innovators must come together to make products secure, safe, and private for customers. Intel will help lead the way.
For more such intel Modern Code and tools from Intel, please visit the Intel® Modern Code
Other Popular Deals
- The 10 best job hunting apps on AndroidTop 10 Android launchers (December 2016)
- The 10 scariest horror games on AndroidAndroid app stores: 5 best alternatives to Google Play Store
- Best Android apps for rooted devices18 apps for a memorable Valentine's Day
- Top 15 Android games that you should playThe 20 best looking games for mobile phones
- 8 Android apps to tickle your funny bone17 must have apps for any Android device (plus alternatives)
- 5 apps to get the Android Lollipop look on your smartphoneTake control of your Android device with these apps
- 7 weird and strange apps for your Smartphone10 neat Google apps you may not know of
- 10 essential Indian apps for Android devicesPerfect Viewer