Ingestible pills equipped with micro cameras. Smart home devices connected to hospital networks. Wearable devices constantly tracking and recording patient data. Thanks to hardware innovation and improvements in IoT technology, we are on the cusp of a Life Sciences R&D transformation. It’s a change fuelled by the growing demand for patient-centric care and the need to improve the bottom line.
Posted by: William Bolt on May 15th, 2017
This is the 25th blog in a series about security and how security is about how you think. One of the latest security buzzwords is “Tokenization” – the process of using tokens within your environment to help with the security.
Posted by: Michael Kain on April 28th, 2017
Here’s a great blog from our friends at LogRhythm. Jake Reynolds writes about the ‘Cyber Kill Chain’ and helping organisations to catch threats before they hit the target.
Posted by: David Matthews on April 6th, 2017
RSA Conference 2017 is a gathering of the entire IT security world that is held annually in San Francisco, California at the Moscone Convention Center. This year, a record 43,000 people attended the conference. The conference slogan is "Where the world talks security."
Posted by: Michael Kain on April 4th, 2017
Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.
Posted by: Stephen Migliore on March 15th, 2017
A team of @Unisys_Security experts – headed by our Chief Trust Officer Tom Patterson – was lucky enough to support the recent launch of The NewStatesman’s latest cyber security report: The NewStatesman Spotlight™ on Cyber Security – Disrupting Diplomacy.
Posted by: Nick Miles on March 9th, 2017
In part 1 of this blog series, we introduced the growing interest in deploying artificial intelligence into Service Desk operations and the segmentation of service incidents that would be most benefit from automated resolution. In part 2, we address the foundational IT, People and Process elements for successful implementation and adoption AI-enabled response and resolution at the Service Desk.
Posted by: Paul Gleeson on March 8th, 2017
This is the 23rd blog in a series about security and how security is about how you think. What’s a security event and what isn’t? In simpler terms, what’s normal and not normal?
Posted by: Michael Kain on March 7th, 2017
Cyber security is rapidly becoming one of the most pressing issues in the world
of aviation. Much of the infrastructure for the industry has transitioned online
and into the cloud, making it an easy target for hackers and opportunists, as
many high-profile (and rather terrifying) recent examples have shown.
Posted by: Christian Gessner on March 2nd, 2017
Explosive growth in cloud computing and mobility has fueled a transformation in the ways that employees work. Successful organizations will address key factors that turbocharge their journey to establish a truly agile global workforce.
Posted by: John Almasy on February 24th, 2017