Security

Security Measures that Build Trust


Security

Securing Against Growing Cyberattack Vectors

November 30th, 2018

Cyberattacks are inevitable. In 2018 alone, we’ve all witnessed several high impact breaches across healthcare, travel and transportation and financial service industries. Early this year, nearly 280,000 medicaid patient records were breached in Oklahoma State University Center for Health Sciences; in April, Delta Airlines reported cyberattack that may have exposed 'several hundred thousand' customers' data and in the same month, SunTrust Banks revealed a data breach involving 1.5 million records.

Continue reading...

Security

Is Your Cybersecurity Program Ready for the Board Room?

November 21st, 2018

Gartner estimates, “By 2020, 100 percent of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually.” In today’s digital world, cybersecurity is so fundamental to an organization’s success that it needs to be managed like other business decisions. This requires articulating value in the same way as the rest of the business—using the language of finance. However, according to a Marsh-Microsoft Cyber Perception Survey, only 11 percent of organizations express cyber risk exposure in economic terms.

Continue reading...

Security

Zero Trust Realized

November 14th, 2018

The Zero Trust security movement has taken hold—and being asked to not trust by default is discouraging. However, when positioning the Unisys contribution to Zero Trust architecture, I became more sanguine about the prospect of applying an identity-driven cybersecurity approach that relies on data obfuscation, security analytics and automation, and that never assumes trust.

Continue reading...

Security

Data Security – The Non-Obvious Facets

August 27th, 2018

A lot is already known and experienced about data security. This blog tries to slice and dice the data security paradigm differently, with the aim of providing a different perspective. The hope is that, different perspectives lead to different viewpoints, thoughts, realizations and ideas. If this blog creates a new thought or idea, and leads to an ‘aha’ moment, then it’s a purpose well served.

Continue reading...

Security

TrustCheck: Challenging Assumptions in Cyber Risk Management

July 27th, 2018

When I was 12 years old, my dad told me, “Never assume, it makes an ass out of u and me.” I don’t recall the context of the discussion, but I do remember responding appropriately with a groan. As I got older, I realized that assumptions are a necessary part of decision-making. But it’s also wise to challenge those assumptions—any time I start to question mine, I think back to that #DadJoke. Cyber risk management is heavily dependent on assumptions. As security leaders, we rely on heat maps, vulnerability counts and patches.... read more.

Continue reading...

Security

Modern Tools for Today’s Growing Threat Landscape

July 27th, 2018

Warmer days bring greener landscape, but with this growth comes maintenance, such as weekly grass trimming. The lawn mower has evolved from sheep, to scythe, to reel cutter, to engine-powered blades—now in the computer age, it uses automation to mow consistently and constantly. Trading my gas-powered lawn mower for a robotic one, I finally decided to stop applying 20th century technology to my 21st century landscape. So why are we not doing the same for cybersecurity?

Continue reading...

APAC Voices

Why Do Some Travellers Resist the Use of Biometrics?

June 27th, 2018

The Unisys Security Index revealed that 75% were willing to use a biometric to confirm their identity at an automated boarding gate when boarding a flight and 71% were willing to use a biometric to identify themselves as a frequent traveller of low security risk. This is good news for government agencies, airports and airlines that are expanding the use of biometrics as part of a seamless and secure travel experience. But it begs a question. Why are over 20% of travellers UNWILLING to use a biometric to identify themselves when travelling?

Continue reading...