Posts tagged for “CyberSecurity”

Managing Risk through Predictive Analytics
Security

Cyberattacks and threats continue to increase and their impact to business operations are becoming more detrimental. Security operations personnel are utilizing data received from monitoring systems to develop usage patterns and behaviors which predict the expected actions inside and outside a network. Are you geared up enough?

Posted by: on December 15th, 2017


Cybersecurity Analytics: The Assistive Technology That Gives Your SOC an Edge
Security

In cybersecurity, our guard can never be let down when it comes to potential threats. Virus programmers and identity thieves are consistently finding new ways to steal information and jeopardize both businesses and individuals.

Posted by: on November 28th, 2017


Gartner Report: GDPR Clarity: 19 Frequently Asked Questions Answered
European Voices

May 25, 2018. That is the date the European General Data Protection Regulation (GDPR) goes into effect. GDPR is a European Union (EU) regulation which outlines and mandates proper handling and compliance for personal data of EU residents.

Posted by: on November 28th, 2017


Why Invest in a Consolidated Medical Device Management Solution?
Life Sciences and Healthcare

Delve into the different areas from which you can reap returns when you invest in a consolidated medical device management solution. It's a lot more than what you probably considered!

Posted by: on November 10th, 2017


Can Your Airport and Airline Security Win Against Today’s Security Challenges?
Travel and Transportation

Airlines and airports are confronted every day with a complex set of security concerns. Because their systems contain credit card data, they need to provide protection against identity theft and bankcard fraud.

Posted by: on November 2nd, 2017


The Cultural Transformation Needed to Overcome Concerns about IT Modernization
Security

A recent survey of 200 federal IT executives on IT modernization, sponsored by Unisys and conducted by research company Market Connections, found that the cybersecurity implications of IT modernization were never far from respondents’ minds.

Posted by: on October 5th, 2017


Elements for Successfully Reporting Cybersecurity Strategies to Senior Leadership
Security

Best practices for U.S. federal government CIOs and CISOs to report cybersecurity strategy and achievements to senior leadership.

Posted by: on August 7th, 2017


Implications of CrashOverride for Industrial Operators
Security

A second successful attack was launched against the Ukrainian electric grid on December 17, 2016. This incident is a classic well-resourced and likely state sponsored attack against infrastructure and Industrial Control Systems (ICS). Industrial operators should understand the attack methodologies and review their own protective practices in context of this incident.

Posted by: on June 22nd, 2017


Unisys – Securing Your Tomorrow: View from Chief Trust Officer Tom Patterson
Trust

Unisys - Securing Your Tomorrow: Four powerful words that totally capture why we work here at Unisys, and how our critically important security teams factor in.

Posted by: on November 16th, 2016


Securing Pharma Supply Chain

Securing the Pharma Supply Chain
European Voices

The pharmaceutical industry is fast evolving. At one end, pharma companies are seeking to reduce R&D costs. On the other, patients are demanding more personalised care. And on top of that, regulators are becoming increasingly stringent with their compliance requirements.

Posted by: on November 9th, 2016


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.