Posts tagged for “CyberSecurity”

Detect, Identify and Take Timely Action against Threats and Intruders
Security

Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.

Posted by: on June 1st, 2015


Continuous Compliance…Moving Beyond a Checklist Mentality
Security

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.

Posted by: on May 14th, 2015


An Upbeat Mood: Impressions of the 2015 RSA Conference
Security

Unisys CISO Dave Frymier shares his general impressions and outlines the major themes he observed at last week's RSA Conference.

Posted by: on April 29th, 2015


Advance Your Approach to Ensure Security Against Advanced Threats
Security

It’s hard to predict all possible threats; however it is possible to proactively mitigate and manage the risk against these threats with intelligence and an advanced approach including following five key steps outlined in this post.

Posted by: on April 27th, 2015


No Time to Think Differently – It’s Time to Move: Speed is Everything When It Comes to Security
Security

Speed is everything when it comes to security. While the saturated security market makes it challenging for organizations to confidently know what next steps to take and what truly innovative security technologies and tools to depend on, now is the time to choose your partners wisely – and move.

Posted by: on April 10th, 2015


Time to FREAK Out?
Security

Attempts by the US government to control the level of encryption in products exported outside the United States by limiting the key length to 512 bits has resulted in one of the peskiest problems in IT – backward compatibility. How do you eliminate a feature, but not break already deployed equipment that expects to use it?

Posted by: on March 10th, 2015


Leading Life Sciences Security
Trust

When a keystroke can kill, a partner website can reveal a billion dollars worth of research, or millions of patient records can be compromised, the stakes are as high as they can get in industry. What are life sciences companies to do?

Posted by: on March 9th, 2015


End to End Security in the Cloud – Securing Your AWS Workloads
Security

This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.

Posted by: on January 30th, 2015


BYOD: How to Achieve a Win-Win for Employee and Enterprise
Mobility

Learn an approach that addresses the BYOD concerns of both enterprise and employee and can provide a win-win solution.

Posted by: on December 23rd, 2014


Data Center Security – Thinking Beyond Perimeter-based Defenses
Security

It is clear that enterprises can now no longer rely on the traditional external defense mechanisms, and need to adopt a “defense-in-depth” approach coupled with innovative new approaches to securing their data centers.

Posted by: on November 14th, 2014


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.