Security

Security Measures that Build Trust


Recent Posts


Managing Risk through Predictive Analytics
Security

Cyberattacks and threats continue to increase and their impact to business operations are becoming more detrimental. Security operations personnel are utilizing data received from monitoring systems to develop usage patterns and behaviors which predict the expected actions inside and outside a network. Are you geared up enough?

Posted by: on December 15th, 2017


Cybersecurity Analytics: The Assistive Technology That Gives Your SOC an Edge
Security

In cybersecurity, our guard can never be let down when it comes to potential threats. Virus programmers and identity thieves are consistently finding new ways to steal information and jeopardize both businesses and individuals.

Posted by: on November 28th, 2017


Gartner Report: GDPR Clarity: 19 Frequently Asked Questions Answered
European Voices

May 25, 2018. That is the date the European General Data Protection Regulation (GDPR) goes into effect. GDPR is a European Union (EU) regulation which outlines and mandates proper handling and compliance for personal data of EU residents.

Posted by: on November 28th, 2017


Gartner Report: Technology Insight for Microsegmentation
Security

What Gartner says about micro-segmentation - a new approach to protecting the critical.

Posted by: on October 25th, 2017


The Cultural Transformation Needed to Overcome Concerns about IT Modernization
Security

A recent survey of 200 federal IT executives on IT modernization, sponsored by Unisys and conducted by research company Market Connections, found that the cybersecurity implications of IT modernization were never far from respondents’ minds.

Posted by: on October 5th, 2017


Elements for Successfully Reporting Cybersecurity Strategies to Senior Leadership
Security

Best practices for U.S. federal government CIOs and CISOs to report cybersecurity strategy and achievements to senior leadership.

Posted by: on August 7th, 2017


Implications of CrashOverride for Industrial Operators
Security

A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.

Posted by: on June 22nd, 2017


7 Analytics Use Cases for Smarter Security
Security

Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.

Posted by: on May 18th, 2017


Three Simple Steps to Combat Ransomware
Security

Tom Patterson's tips for protecting against ransomware following Friday's attacks.

Posted by: on May 17th, 2017


Front Lines of Cybersecurity
Security

Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.

Posted by: on March 15th, 2017


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.