Posts tagged for “CyberSecurity”
A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.
Posted by: Christopher Blask on June 22nd, 2017
Unisys - Securing Your Tomorrow: Four powerful words that totally capture why we work here at Unisys, and how our critically important security teams factor in.
Posted by: Tom Patterson on November 16th, 2016
The pharmaceutical industry is fast evolving. At one end, pharma companies are seeking to reduce R&D costs. On the other, patients are demanding more personalised care. And on top of that, regulators are becoming increasingly stringent with their compliance requirements.
Posted by: William Bolt on November 9th, 2016
The Unisys team is excited to be attending this year’s IP Expo Europe taking place from 5th – 6th October at London’s ExCeL centre. Come visit us at stand CC8 to learn all about the changing world of the digital enterprise and how our Stealth solution suite can lower risks and costs in the fight against cyber threats.
Posted by: Nick Miles on September 14th, 2016
Unisys is a Platinum Sponsor at Gartner’s Security & Risk Summit in London. On the 12th – 13th September, Gartner’s Security and Risk Summit 2016 will be held at the InterContinental London at The O2.
Posted by: Nick Miles on September 8th, 2016
Mainstream media demonstrates that the appetite for knowledge about Generation Z is growing. For tech-dependent businesses, the most pressing concern about Generation Z is their relationship with IT and how it will impact upon the workplace.
Posted by: Sandro Lindner on May 11th, 2016
Challenges related to cybersecurity remain enormous, and we are playing catch up from many years of reliance on outdated technologies. However the recognition and direction we are seeing from those at the highest levels of government is a welcome and positive move.
Posted by: Casey Coleman on April 14th, 2016
Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.
Posted by: Linda Welch on December 3rd, 2015
One can no longer afford to simply watch unfolding cyber events, usually a step too slow to do more than figure out what just happened. Instead, we need to embrace a new way of defending ourselves – by assuming the bad guys already are inside of our organizations.
Posted by: Tom Patterson on September 14th, 2015
The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.
Posted by: Nick Evans on June 30th, 2015