Tuesday, September 20th, 2011
Sowmya Murthy interviews Gholam Sheibani about over-regulating in this new cybersecurity space across large enterprises and governments. Gholam’s experience warns us about some pitfalls in jumping head first into policy definition that leads to an unworkable lockdown strategy regarding cyberstrategy.
Thursday, September 8th, 2011
Steve Vinsik was recently in Cartagena, Columbia, presenting protecting identities concept on secure remote banking at the 11th Strategic Congress on Technology and Financial Marketing Conference known as CL@B. We interviewed him.
Tuesday, September 6th, 2011
A global team of Unisys Security experts and consultants invite you to this twelve-week long blog conversation that examines trends that breaches the neat physical and digital enterprise borders that used to work. We live in the world of a growing Cloud; misplaced corporate mobile devices; leaking valves of sensitive customer data; “42-steps” ahead hacktavists; Our enterprises are more porous than ever before. The question really is less about if there is a borderless, and more about what will it take to secure this borderless enterprise?