Posts tagged for “CyberSecurity”

Micro-Segmentation: Lowering the Cost and Risk of Network Security
European Voices

Unisys is a Platinum Sponsor at Gartner’s Security & Risk Summit in London. On the 12th – 13th September, Gartner’s Security and Risk Summit 2016 will be held at the InterContinental London at The O2.

Posted by: on September 8th, 2016


Generation Z and Cybersecurity: Can Businesses Balance Both?
European Voices

Mainstream media demonstrates that the appetite for knowledge about Generation Z is growing. For tech-dependent businesses, the most pressing concern about Generation Z is their relationship with IT and how it will impact upon the workplace.

Posted by: on May 11th, 2016


Federal Cybersecurity Off to a Flying Start in 2016
On Point

Challenges related to cybersecurity remain enormous, and we are playing catch up from many years of reliance on outdated technologies. However the recognition and direction we are seeing from those at the highest levels of government is a welcome and positive move.

Posted by: on April 14th, 2016


Diamonds and Paper Clips
Security

Learn the importance of identifying your key assets (diamonds) versus non critical assets (paper clips) in your environment to protect and encrypt to prevent security intrusions.

Posted by: on December 3rd, 2015


The Bad Guys are Already In: 5 Steps to Defend against Cybercriminals
Trust

One can no longer afford to simply watch unfolding cyber events, usually a step too slow to do more than figure out what just happened. Instead, we need to embrace a new way of defending ourselves – by assuming the bad guys already are inside of our organizations.

Posted by: on September 14th, 2015


Findings from the 2015 Unisys Security Insights Survey
Security

The survey found that levels of concern about cybersecurity were high in certain U.S. industry sectors, particularly retail, government and telecom.

Posted by: on June 30th, 2015


The New Landscape of Outsourcing in Financial Services
Financial Industry Insights

With more financial institutions prioritizing “back office” operations, a growth in specialized services has afforded banks with the ability to outsource without sacrificing quality or cost.

Posted by: on June 17th, 2015


Detect, Identify and Take Timely Action against Threats and Intruders
Security

Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.

Posted by: on June 1st, 2015


Continuous Compliance…Moving Beyond a Checklist Mentality
Security

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.

Posted by: on May 14th, 2015


An Upbeat Mood: Impressions of the 2015 RSA Conference
Security

Unisys CISO Dave Frymier shares his general impressions and outlines the major themes he observed at last week's RSA Conference.

Posted by: on April 29th, 2015


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.