Posts tagged for “Security”
Today, I am pleased to announce the results of the 2017 Unisys Security Index™ – the only recurring snapshot of security concerns conducted globally. Initially launched 10 years ago, the index provides an ongoing, statistically-robust measure of consumer concern about security, and this year, shows that security concerns abound – in fact, they are higher than ever before.
Posted by: Ann Sung Ruckstuhl on June 20th, 2017
Security is at the forefront of everything Unisys does – not just with particular products or services, but rather that it is integrated into all of our solutions. Today’s launch of our Unisys Security Index™ results reinforces our company vision: to enhance peoples’ lives through digital security as well as our commitment to security – both internally and externally with our clients.
Posted by: Peter Altabef on June 20th, 2017
This blog is a series about security and how security is about how you think. This is a special article (the 26th in the series) about the recently released version of ClearPath® MCP software.
Posted by: Michael Kain on June 5th, 2017
This is the 25th blog in a series about security and how security is about how you think. One of the latest security buzzwords is “Tokenization” – the process of using tokens within your environment to help with the security.
Posted by: Michael Kain on April 28th, 2017
RSA Conference 2017 is a gathering of the entire IT security world that is held annually in San Francisco, California at the Moscone Convention Center. This year, a record 43,000 people attended the conference. The conference slogan is "Where the world talks security."
Posted by: Michael Kain on April 4th, 2017
Last week, more than 500 executives from various banks, securities firms, and asset management companies gathered to hear Tom Patterson, Chief Trust Officer at Unisys, speak at the Securities Industry Institute® (SII) executive development program hosted by SIFMA and the Wharton School of Business.
Posted by: Stephen Migliore on March 15th, 2017
This is the 23rd blog in a series about security and how security is about how you think. What’s a security event and what isn’t? In simpler terms, what’s normal and not normal?
Posted by: Michael Kain on March 7th, 2017
This is the 22nd blog in a series about security and how security is about how you think. How you think about security also determines where the best practices are put – MUST, SHOULD, or COULD as they apply to your environments and computer systems.
Posted by: Michael Kain on January 18th, 2017
This is the 21st blog in a series about security and how security is about how you think.
With the last six blogs, I’ve examined the six more obvious goals of security: authentication, access control, data integrity, confidentiality, availability, and non-repudiation. We need to talk about the secret seventh one: TRUST.
Posted by: Michael Kain on December 20th, 2016
This blog is about another enhancement in Release 17 that is not a product feature but a high-level explanation of the security philosophy, goals, and features in ClearPath OS 2200.
Posted by: Dr. Glen E. Newton on December 7th, 2016