Security

Security Measures that Build Trust


Recent Posts


Elements for Successfully Reporting Cybersecurity Strategies to Senior Leadership
Security

Best practices for U.S. federal government CIOs and CISOs to report cybersecurity strategy and achievements to senior leadership.

Posted by: on August 7th, 2017


Implications of CrashOverride for Industrial Operators
Security

A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.

Posted by: on June 22nd, 2017


7 Analytics Use Cases for Smarter Security
Security

Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.

Posted by: on May 18th, 2017


Three Simple Steps to Combat Ransomware
Security

Tom Patterson's tips for protecting against ransomware following Friday's attacks.

Posted by: on May 17th, 2017


Front Lines of Cybersecurity
Security

Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.

Posted by: on March 15th, 2017


Diamonds and Paper Clips
Security

Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.

Posted by: on December 3rd, 2015


Findings from the 2015 Unisys Security Insights Survey
Security

The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.

Posted by: on June 30th, 2015


Detect, Identify and Take Timely Action against Threats and Intruders
Security

Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.

Posted by: on June 1st, 2015


Continuous Compliance…Moving Beyond a Checklist Mentality
Security

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.

Posted by: on May 14th, 2015


Look, We Don’t Catch the Smart Ones
Security

At this year's RSA Conference the Cryptographers' Panel was all but boring. Get a recap of this lively conversation centered on an NSA-sponsored proposal to require “backdoors” or “skeleton keys” to be placed in technology products that feature strong encryption so that law enforcement can perform the digital equivalent of wiretapping.

Posted by: on May 6th, 2015


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.