Skip to content
Cyber Security Inside Podcast

IT Professionals Choose Security Solutions

By Tom Garrison, VP & GM of Intel Client Security Strategy & Initiatives

security, cybersecurity, hardware trust

Does your mom know what you do for work? It is not a trick question since many people in technology struggle to explain it in simple terms. Thanks to some of the high visibility security attacks, my mother now understands what I do for a living. Well, at least in general terms.

The Changing Security Ecosystem

With SolarWinds, Colonial Pipeline, and other high visibility attacks, more people are aware of the increased severity in the security ecosystem. IT security challenges continue to increase with cyberattacks, ransomware, data breaches, and large-scale security threats. Today, more people are aware of the increase security threats than ever.

Security Research Data

Ponemon Institute, an independent research and education company, recently published research data in sponsorship with Intel. Security threats are increasing, and IT professionals are responding by investing in security technologies. 36% of IT professionals surveyed say their organization’s current cybersecurity protocols use hardware-assisted security solutions, and of those same 36%, 85% list hardware and/or firmware security as a high or very high priority. Additionally, nearly two-third (64%) say they want their vendors to offer both hardware and software security capabilities. Companies who think security is important, are making purchasing decisions with security in mind.

What Is Hardware Security

Hardware-based security is keeping the computer safe by using components such as processors. It is vulnerability protection that help reduce the risk of being exploited in a physical device rather than software. You can learn more about Intel’s commitment and investment by reading Security Begins with Intel®. Are you interested in understanding the security experience and expertise of Intel’s CTO? Listen to “Cyber Attacks, Bank Fraud, & More: Cybersecurity with Greg Lavender” podcast.

What Is Software Security

Firmware or software-based solution can enable device security and updates to be centrally managed from a cloud-based platform. Updates to your android phone is an example.

Vulnerability Management

According to Gartner, vulnerability management “is capabilities to identify, categorize and manage vulnerabilities. These include unsecure system configurations or missing patches, as well as other security-related updates in the systems connected to the enterprise network directly, remotely, or in the cloud.”

The Importance of Security Management

The IT security landscape has shifted with increasing security challenges. Ponemon’s report tells us security teams spend nearly half (17 hours/week) of their week mapping known vulnerabilities in IoT devices. It makes sense that nearly 70% believe hardware or firmware security solutions make vulnerability management more effective. They are choosing companies, like Intel, who offer vulnerability management processes.

Making Security a Purchasing Criteria

Without visibility and transparency, there is no trust. Intel understands why this is important. Providing visibility and timely security updates is our goal, ensuring our customers have a positive experience with our technology. Keeping our customers’ device fleets secure is critically important and something we strive to deliver on every day. Pat Gelsinger, Intel’s CEO, talks about Intel’s commitment to security in Intel’s Security-First Pledge.

Supply Chain Security

According to the Ponemon Institute, of the 36% of IT professionals who say their organization’s current cybersecurity protocols use hardware-assisted security solutions, over half (53%) are using tools and policies to ensure hardware supply chain assurance and transparency. We need to expand the definition of supply chain security beyond the physical and include digital supply chain security. To understand more on this topic, read “Supply Chain Goes Digital” co-published by Intel and Dell. The authors talk about security innovations that deliver more secure compute supply chains.

Security Careers

There is a large skills gap in the cybersecurity industry. Steve Morgan @CybersecuritySF, founder of Cybersecurity Ventures, has predicted that global cybercrime damages will exceed $10.5 trillion annually by 2025. With this potential growth, it is critical to innovate for security. And if you want a fun book, check out Steve and Connor Morgan’s new Hackers’ Movie Guide book. It has the complete list of hacker and cybersecurity movies. Because who doesn’t love a good movie!

Security Education

If you are interested in learning more, check out for a list of podcasts and YouTube videos. Content includes topics from security careers, supply chain security, AI, NLP, digital transformation, and more. Follow me on Twitter at @tommgarrison.

Legal Notices and Disclaimers.


Share on social: