Security Measures that Build Trust

Look, We Don’t Catch the Smart Ones

At this year's RSA Conference the Cryptographers' Panel was all but boring. Get a recap of this lively conversation centered on an NSA-sponsored proposal to require “backdoors” or “skeleton keys” to be placed in technology products that feature strong encryption so that law enforcement can perform the digital equivalent of wiretapping.

Posted by: on May 6th, 2015

An Upbeat Mood: Impressions of the 2015 RSA Conference

Unisys CISO Dave Frymier shares his general impressions and outlines the major themes he observed at last week's RSA Conference.

Posted by: on April 29th, 2015

Advance Your Approach to Ensure Security Against Advanced Threats

It’s hard to predict all possible threats; however it is possible to proactively mitigate and manage the risk against these threats with intelligence and an advanced approach including following five key steps outlined in this post.

Posted by: on April 27th, 2015

No Time to Think Differently – It’s Time to Move: Speed is Everything When It Comes to Security

Speed is everything when it comes to security. While the saturated security market makes it challenging for organizations to confidently know what next steps to take and what truly innovative security technologies and tools to depend on, now is the time to choose your partners wisely – and move.

Posted by: on April 10th, 2015

Time to FREAK Out?

Attempts by the US government to control the level of encryption in products exported outside the United States by limiting the key length to 512 bits has resulted in one of the peskiest problems in IT – backward compatibility. How do you eliminate a feature, but not break already deployed equipment that expects to use it?

Posted by: on March 10th, 2015

End to End Security in the Cloud – Securing Your AWS Workloads

This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.

Posted by: on January 30th, 2015

Data Center Security – Thinking Beyond Perimeter-based Defenses

It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.

Posted by: on November 14th, 2014

4 Tips for Organizations to Combat Cybercrime

For the fifth and final week of National Cyber Security Awareness Month, we look at 4 tips for organizations to combat cybercrime.

Posted by: on October 30th, 2014

The Benefits of Access Governance – The New Baseline for Identity Management

The primary objectives of identity and access governance are to manage risk and ensure compliance in a consistent, efficient and effective manner. Access governance is about implementing well-described processes, procedures, and guidelines.

Posted by: on October 27th, 2014

5 Key Security Considerations for SMBs in 2015

For week four of National Cyber Security Awareness Month, we look at 5 key security considerations for small and medium-sized companies in 2015.

Posted by: on October 23rd, 2014

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.