Security Measures that Build Trust
Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.
Posted by: Linda Welch on December 3rd, 2015
The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.
Posted by: Nick Evans on June 30th, 2015
Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.
Posted by: Dr. Gerhard Knecht on June 1st, 2015
Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.
Posted by: Jeffrey Johnson on May 14th, 2015
At this year's RSA Conference the Cryptographers' Panel was all but boring. Get a recap of this lively conversation centered on an NSA-sponsored proposal to require “backdoors” or “skeleton keys” to be placed in technology products that feature strong encryption so that law enforcement can perform the digital equivalent of wiretapping.
Posted by: Dave Frymier on May 6th, 2015
Unisys CISO Dave Frymier shares his general impressions and outlines the major themes he observed at last week's RSA Conference.
Posted by: Dave Frymier on April 29th, 2015
It’s hard to predict all possible threats; however it is possible to proactively mitigate and manage the risk against these threats with intelligence and an advanced approach including following five key steps outlined in this post.
Posted by: Jai Arun on April 27th, 2015
Speed is everything when it comes to security. While the saturated security market makes it challenging for organizations to confidently know what next steps to take and what truly innovative security technologies and tools to depend on, now is the time to choose your partners wisely – and move.
Posted by: Stephen McCarney on April 10th, 2015
Attempts by the US government to control the level of encryption in products exported outside the United States by limiting the key length to 512 bits has resulted in one of the peskiest problems in IT – backward compatibility. How do you eliminate a feature, but not break already deployed equipment that expects to use it?
Posted by: Dave Frymier on March 10th, 2015
This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.
Posted by: Jeffrey Johnson on January 30th, 2015