Posts By Author: Dr. Glen E. Newton

About the Author

Dr. Glen Newton is a consulting engineer and the security architect for the ClearPath OS 2200 product line. Glen’s career with Unisys has spanned over 40 years in the areas of security, operations management, and operating systems.

Monster Halloween Gala

You’ve been invited to a Halloween gala featuring one of your favorite local bands. You’re thrilled at the invitation and decide to see what the band has been up to lately.

Posted by: on October 23rd, 2017

ClearPath OS 2200 Security Explained

This blog is about another enhancement in Release 17 that is not a product feature but a high-level explanation of the security philosophy, goals, and features in ClearPath OS 2200.

Posted by: on December 7th, 2016

ClearPath OS 2200 Release 17: The Most Secure Release Yet

ClearPath OS 2200 Release 17 continues the progression of features that you can use to secure your systems and data. Here are a few of the highlights.

Posted by: on October 5th, 2016

Words of the Day: MAC and DAC

This blog explores the topic of access control and its method of protection.

Posted by: on April 14th, 2016

Protecting Your PII

Protecting PII from unauthorized access is an essential part of every company’s security policies, because when PII is revealed to unauthorized users, it often appears in the news media.

Posted by: on February 26th, 2016

Word of the Day: PII

What can you do to ensure that your customers can trust you with their PII? Here are a few suggestions...

Posted by: on October 23rd, 2015

Pumpkin Party

The scariest creatures aren’t ringing your doorbell and calling “trick or treat” – they’re sitting at computer terminals and living off your credit cards!

Posted by: on September 10th, 2015

Apex Reports for Defense in Depth and Compliance

Apex reporting, included in ClearPath OS 2200 Release 16.0, help support a “defense in depth” strategy and facilitate compliance with policies, regulations, and standards.

Posted by: on March 18th, 2015

Let’s Shed Some Light on this Malware

With over 80% of the cell phone market using some level of Android operating system, Android phones are a particularly fertile ground for cyber-criminals. Dr. Newton offers some suggestions for protecting yourself from cellphone malware.

Posted by: on November 20th, 2014

Who Was That Masked Man?

The nightmare of identity theft affects tens of millions of people every year. It disrupts lives, damages reputations, creates financial loss, and provides a cloak of anonymity to criminals.

Posted by: on October 21st, 2014

<< Back

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.