Innovative Thinkers and Industry Leaders Sharing Insights and Perspectives
Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.
Posted by: Mark Loucks on May 18th, 2017
Tom Patterson's tips for protecting against ransomware following Friday's attacks.
Posted by: Tom Patterson on May 17th, 2017
Ingestible pills equipped with micro cameras. Smart home devices connected to hospital networks. Wearable devices constantly tracking and recording patient data. Thanks to hardware innovation and improvements in IoT technology, we are on the cusp of a Life Sciences R&D transformation. It’s a change fuelled by the growing demand for patient-centric care and the need to improve the bottom line.
Posted by: William Bolt on May 15th, 2017
This is the 25th blog in a series about security and how security is about how you think. One of the latest security buzzwords is “Tokenization” – the process of using tokens within your environment to help with the security.
Posted by: Michael Kain on April 28th, 2017
Here’s a great blog from our friends at LogRhythm. Jake Reynolds writes about the ‘Cyber Kill Chain’ and helping organisations to catch threats before they hit the target.
Posted by: David Matthews on April 6th, 2017
RSA Conference 2017 is a gathering of the entire IT security world that is held annually in San Francisco, California at the Moscone Convention Center. This year, a record 43,000 people attended the conference. The conference slogan is "Where the world talks security."
Posted by: Michael Kain on April 4th, 2017
Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.
Posted by: Stephen Migliore on March 15th, 2017
A team of @Unisys_Security experts – headed by our Chief Trust Officer Tom Patterson – was lucky enough to support the recent launch of The NewStatesman’s latest cyber security report: The NewStatesman Spotlight™ on Cyber Security – Disrupting Diplomacy.
Posted by: Nick Miles on March 9th, 2017
In part 1 of this blog series, we introduced the growing interest in deploying artificial intelligence into Service Desk operations and the segmentation of service incidents that would be most benefit from automated resolution. In part 2, we address the foundational IT, People and Process elements for successful implementation and adoption AI-enabled response and resolution at the Service Desk.
Posted by: Paul Gleeson on March 8th, 2017
This is the 23rd blog in a series about security and how security is about how you think. What’s a security event and what isn’t? In simpler terms, what’s normal and not normal?
Posted by: Michael Kain on March 7th, 2017