Security Measures that Build Trust
A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.
Posted by: Christopher Blask on June 22nd, 2017
Use Data Analytics combined with Machine Learning as the power tool to identify threats before they happen.
Posted by: Mark Loucks on May 18th, 2017
Tom Patterson's tips for protecting against ransomware following Friday's attacks.
Posted by: Tom Patterson on May 17th, 2017
Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.
Posted by: Stephen Migliore on March 15th, 2017
Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.
Posted by: Linda Welch on December 3rd, 2015
The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.
Posted by: Nick Evans on June 30th, 2015
Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.
Posted by: Dr. Gerhard Knecht on June 1st, 2015
Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.
Posted by: Jeffrey Johnson on May 14th, 2015
At this year's RSA Conference the Cryptographers' Panel was all but boring. Get a recap of this lively conversation centered on an NSA-sponsored proposal to require “backdoors” or “skeleton keys” to be placed in technology products that feature strong encryption so that law enforcement can perform the digital equivalent of wiretapping.
Posted by: Dave Frymier on May 6th, 2015
Unisys CISO Dave Frymier shares his general impressions and outlines the major themes he observed at last week's RSA Conference.
Posted by: Dave Frymier on April 29th, 2015