Innovative Thinkers and Industry Leaders Sharing Insights and Perspectives
A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.
Posted by: Christopher Blask on June 22nd, 2017
Today, I am pleased to announce the results of the 2017 Unisys Security Index™ – the only recurring snapshot of security concerns conducted globally. Initially launched 10 years ago, the index provides an ongoing, statistically-robust measure of consumer concern about security, and this year, shows that security concerns abound – in fact, they are higher than ever before.
Posted by: Ann Sung Ruckstuhl on June 20th, 2017
Security is at the forefront of everything Unisys does – not just with particular products or services, but rather that it is integrated into all of our solutions. Today’s launch of our Unisys Security Index™ results reinforces our company vision: to enhance peoples’ lives through digital security as well as our commitment to security – both internally and externally with our clients.
Posted by: Peter Altabef on June 20th, 2017
A Windows 10 migration is not always a slam dunk. Here are the top four ways a migration can go bad.
Posted by: Weston Morris on June 13th, 2017
This blog is a series about security and how security is about how you think. This is a special article (the 26th in the series) about the recently released version of ClearPath® MCP software.
Posted by: Michael Kain on June 5th, 2017
Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.
Posted by: Mark Loucks on May 18th, 2017
Tom Patterson's tips for protecting against ransomware following Friday's attacks.
Posted by: Tom Patterson on May 17th, 2017
Ingestible pills equipped with micro cameras. Smart home devices connected to hospital networks. Wearable devices constantly tracking and recording patient data. Thanks to hardware innovation and improvements in IoT technology, we are on the cusp of a Life Sciences R&D transformation. It’s a change fuelled by the growing demand for patient-centric care and the need to improve the bottom line.
Posted by: William Bolt on May 15th, 2017
This is the 25th blog in a series about security and how security is about how you think. One of the latest security buzzwords is “Tokenization” – the process of using tokens within your environment to help with the security.
Posted by: Michael Kain on April 28th, 2017
Here’s a great blog from our friends at LogRhythm. Jake Reynolds writes about the ‘Cyber Kill Chain’ and helping organisations to catch threats before they hit the target.
Posted by: David Matthews on April 6th, 2017