How U.S. federal agencies can meet mandates for digital transformation.
Posted by: Venkatapathi Puvvada on July 19th, 2017
Several instances of cyber attacks on healthcare facilities and medical devices have made the headlines recently.There is no stopping them, unless proactive measures are taken to secure the healthcare technology ecosystem. In a world of IoT and network connected medical devices, how exactly can you achieve this? Read on to know more.
Posted by: William Parkinson on July 14th, 2017
A reflection on the milestones achieved by the Unisys team and a renewed energy for what is to come as we focus on enhancing, extending, and expanding the value we bring to our clients.
Posted by: Eric Hutto on July 11th, 2017
This is the 27th blog in a series about security and how security is about how you think. The recent WannaCry ransomware attack focused most security administrator’s focus on their policies on when they patch their systems.
Posted by: Michael Kain on July 7th, 2017
A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.
Posted by: Christopher Blask on June 22nd, 2017
Today, I am pleased to announce the results of the 2017 Unisys Security Index™ – the only recurring snapshot of security concerns conducted globally. Initially launched 10 years ago, the index provides an ongoing, statistically-robust measure of consumer concern about security, and this year, shows that security concerns abound – in fact, they are higher than ever before.
Posted by: Ann Sung Ruckstuhl on June 20th, 2017
Security is at the forefront of everything Unisys does – not just with particular products or services, but rather that it is integrated into all of our solutions. Today’s launch of our Unisys Security Index™ results reinforces our company vision: to enhance peoples’ lives through digital security as well as our commitment to security – both internally and externally with our clients.
Posted by: Peter Altabef on June 20th, 2017
A Windows 10 migration is not always a slam dunk. Here are the top four ways a migration can go bad.
Posted by: Weston Morris on June 13th, 2017
This blog is a series about security and how security is about how you think. This is a special article (the 26th in the series) about the recently released version of ClearPath® MCP software.
Posted by: Michael Kain on June 5th, 2017
Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.
Posted by: Unisys Corp Editor on May 18th, 2017