Unisys Blogs

Innovative Thinkers and Industry Leaders Sharing Insights and Perspectives

Recent Posts


Implications of CrashOverride for Industrial Operators
Security

A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.

Posted by: on June 22nd, 2017


Introducing the 2017 Unisys Security Index™!
Executive Conversations

Today, I am pleased to announce the results of the 2017 Unisys Security Index™ – the only recurring snapshot of security concerns conducted globally. Initially launched 10 years ago, the index provides an ongoing, statistically-robust measure of consumer concern about security, and this year, shows that security concerns abound – in fact, they are higher than ever before.

Posted by: on June 20th, 2017


Leveraging Research to Enhance Peoples’ Lives through Digital Security
Executive Conversations

Security is at the forefront of everything Unisys does – not just with particular products or services, but rather that it is integrated into all of our solutions. Today’s launch of our Unisys Security Index™ results reinforces our company vision: to enhance peoples’ lives through digital security as well as our commitment to security – both internally and externally with our clients.

Posted by: on June 20th, 2017


4 Ways to Ensure that Your Windows 10 Migration Goes Bad
Workspace

A Windows 10 migration is not always a slam dunk. Here are the top four ways a migration can go bad.

Posted by: on June 13th, 2017


Thinking Security: ClearPath MCP Release 18.0
ClearPath

This blog is a series about security and how security is about how you think. This is a special article (the 26th in the series) about the recently released version of ClearPath® MCP software.

Posted by: on June 5th, 2017


7 Analytics Use Cases for Smarter Security
Security

Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.

Posted by: on May 18th, 2017


Three Simple Steps to Combat Ransomware
Security

Tom Patterson's tips for protecting against ransomware following Friday's attacks.

Posted by: on May 17th, 2017


From Clinical Trials to Drug Manufacturing: How IoT is Transforming the Life Sciences Industry
European Voices

Ingestible pills equipped with micro cameras. Smart home devices connected to hospital networks. Wearable devices constantly tracking and recording patient data. Thanks to hardware innovation and improvements in IoT technology, we are on the cusp of a Life Sciences R&D transformation. It’s a change fuelled by the growing demand for patient-centric care and the need to improve the bottom line.

Posted by: on May 15th, 2017


Thinking Security: What’s a token?
ClearPath

This is the 25th blog in a series about security and how security is about how you think. One of the latest security buzzwords is “Tokenization” – the process of using tokens within your environment to help with the security.

Posted by: on April 28th, 2017


LOGRHYTHM BLOG : Security-Aware Adaptive Networks are Now a Reality
European Voices

Here’s a great blog from our friends at LogRhythm. Jake Reynolds writes about the ‘Cyber Kill Chain’ and helping organisations to catch threats before they hit the target.

Posted by: on April 6th, 2017


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.