Posts By Author: Steve Vinsik

We’re In This Together
On Point

Michigan Governor Rick Snyder delivered a compelling message today at the Michigan Cyber Summit, focused on the theme, "We're all in this together" Not only did he deliver this important message, but he backed it up with action.

Posted by: on October 25th, 2013


CyberSecurity Trends in 2013: Evolving Threats Require Security Be Built-in, Not Bolted-on
Security

Unisys is positioned in the "Visionaries" quadrant of the Gartner Magic Quadrant for Managed Mobility Services report.

Posted by: on January 17th, 2013


The Stealth Mode – Protecting Business from the Inside Out
Security

The need of the hour is a network security infrastructure that enables sharing without the risk of another group accessing data, applications, workstations, servers and virtual machines.

Posted by: on June 14th, 2012


Unisys Security Index: Consumer Awareness Brings Expectations on Organizations
Disruptive IT Trends

In a recent Unisys Security Index, we found the highest levels of consumer concern about protection of personal information and identity theft.

Posted by: on May 11th, 2012


Unisys Security Index’s Global Inquiry Focuses on Consumer Reaction to Data Breaches
Security

Steve Vinsik, VP Global Security Solutions, shares his view on Unisys Security Index findings on consumers' reaction to data security breaches.

Posted by: on November 2nd, 2011


Michigan Cyber Summit – Unisys Takes Part in National Cyber Security Awareness Month
Security

Michigan Cyber Summit focuses on threats emanating from organized crime, hacktivists, and nation state-sponsored cyber attacks.

Posted by: on October 13th, 2011


Deconstructing CyberCrime: Beyond Sensational News Stories
Security

Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.Steve Vinsik, VP, Global Security Solutions, discusses breaking down the anatomy of a cybercrime.

Posted by: on September 6th, 2011


Ten Air Cargo Commandments for Improved Security
Security

Ten commandants that air cargo shippers, service providers, and international governments should follow to ensure security throughout the larger supply chain.

Posted by: on August 29th, 2011


Cyber Crime: How to Prevent an Attack and Mitigate Damage
Security

It’s one thing to have a social media policy. It’s another thing to make sure employees are familiar with it.

Posted by: on June 6th, 2011


The New Threat to Critical Infrastructure
Security

What is the definition of business value to you? A CIO could increase the value of IT with cost measurements, better collaboration, and increased efficiency but without improved reporting that demonstrate what IT is accomplishing, it can be hard to improve the perception of IT’s value.

Posted by: on May 26th, 2011


<< Back


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.