Security Measures that Build Trust
A recent survey of 200 federal IT executives on IT modernization, sponsored by Unisys and conducted by research company Market Connections, found that the cybersecurity implications of IT modernization were never far from respondents’ minds.
Posted by: Venkatapathi Puvvada on October 5th, 2017
Best practices for U.S. federal government CIOs and CISOs to report cybersecurity strategy and achievements to senior leadership.
Posted by: Venkatapathi Puvvada on August 7th, 2017
A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.
Posted by: Christopher Blask on June 22nd, 2017
Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.
Posted by: Unisys Corp Editor on May 18th, 2017
Tom Patterson's tips for protecting against ransomware following Friday's attacks.
Posted by: Tom Patterson on May 17th, 2017
Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.
Posted by: Stephen Migliore on March 15th, 2017
Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.
Posted by: Linda Welch on December 3rd, 2015
The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.
Posted by: Nick Evans on June 30th, 2015
Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.
Posted by: Dr. Gerhard Knecht on June 1st, 2015
Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.
Posted by: Jeffrey Johnson on May 14th, 2015