Thinking Security: Thinking Or Not Thinking Security

This is the 29th blog in a series about security and how security is about how you think.

Posted by: on August 29th, 2017

Delivering Comfort, Safety, and Health in Nursing Homes with Integrated Technology
Life Sciences and Healthcare

New technologies are bringing fresh opportunities for nursing homes to improve comfort, safety, and health for their residents. Explore some of these possibilities in this blog.

Posted by: on August 21st, 2017

Planning Your Next Medical Device Purchase
Life Sciences and Healthcare

In the absence of systematic and data based procurement decisions, healthcare organizations often end up spending unwisely on medical devices. How do you use data effectively in a healthcare procurement scenario? What data is worth considering and what is not? Moreover, how do you make buying decisions inherent in the medical device ecosystem? Read on to find out.

Posted by: on August 14th, 2017

Elements for Successfully Reporting Cybersecurity Strategies to Senior Leadership

Best practices for U.S. federal government CIOs and CISOs to report cybersecurity strategy and achievements to senior leadership.

Posted by: on August 7th, 2017

Survey Invitation: Assessing Your Organization’s Digital Transformation Maturity

Article promoting our new digital transformation maturity survey in conjunction with the British Computer Society (BCS) and inviting readers to take the assessment on behalf of their respective organizations.

Posted by: on August 3rd, 2017

Getting the Most from Your Windows 10 Migration Through Unisys’ Automation and End-User Self-Service

What differentiates Unisys’ Windows 10 Migration process is the use of automation and end-user engagement to help drive down an organization’s costs and reduce down time.

Posted by: on August 1st, 2017

Thinking Security: WannaCry? Not on ClearPath Forward™

This is the 28th blog in a series about security and how security is about how you think. The recent WannaCry (also known as WannaCrypt) vulnerability and subsequent announcement of a related vulnerability in Samba (the software which provides SMB functionality in Linux) had many organizations in panic mode.

Posted by: on July 26th, 2017

Revolutionising the Passenger Journey with Data
European Voices

Airline passengers hope for a seamless, connected journey. We dream of moving smoothly from arrival at the airport, to baggage check and security, to shopping in Duty Free, to checking emails over WiFi, to perhaps visiting the airline lounge and boarding the plane

Posted by: on July 26th, 2017

IoT Insights from Wave 2 of the 2017 Unisys Security Index™

I’m pleased to announce that we have begun to roll out Wave 2 of the 2017 Unisys Security Index™ -- the only recurring snapshot of consumer security concerns conducted globally. In Wave 1 we gauged the general security concerns of more than 13,000 consumers in 13 countries worldwide. In Wave 2, we measured security concerns on one of the fastest-growing IT phenomena of our time: the Internet of Things (IoT).

Posted by: on July 25th, 2017

Is Your IT Ecosystem Safe? (Part 2)
Life Sciences and Healthcare

Not enough attention is typically given to securing the IT networks of healthcare facilities, including medical devices. The recent WannaCry and Petya malware attacks were a painful reminder of this fact. Now that the healthcare fraternity has woken up to the need for securing their IT networks, including medical devices, let’s look at some best practices.

Posted by: on July 21st, 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.