Getting to Trust

Security for an Insecure World

Recent Posts

Unisys – Securing Your Tomorrow: View from Chief Trust Officer Tom Patterson

Unisys - Securing Your Tomorrow: Four powerful words that totally capture why we work here at Unisys, and how our critically important security teams factor in.

Posted by: on November 16th, 2016

Key Takeaways from the World Economic Forum’s Resilience Imperative

Unisys’ Chief Trust Officer Tom Patterson highlights the key themes, trends, and insights stemming from the World Economic Forum’s Resilience Imperative workshop which focused on adapting to and building resilience against global risks and threats within the financial, transportation, and healthcare industry sectors.

Posted by: on August 24th, 2016

Three Game-changing Security Strategies That Put You Back in Control

There are three new game-changing security strategies that can deliver on a new approach, that understands security must be effective without being perfect, that it must embrace modern technology like clouds and mobile and IoT, and must support the new business models of integrated supply chains and customer self-service.

Posted by: on May 24th, 2016

A Fresh Look at Energy Security with uSeg

Need fresh eyes on security? Learn why micro-segmentation (uSeg) is the answer to today's energy security.

Posted by: on November 23rd, 2015

The Bad Guys are Already In: 5 Steps to Defend against Cybercriminals

One can no longer afford to simply watch unfolding cyber events, usually a step too slow to do more than figure out what just happened. Instead, we need to embrace a new way of defending ourselves – by assuming the bad guys already are inside of our organizations.

Posted by: on September 14th, 2015

Between Defense and Recovery: The Growing Trend Toward Mitigation

Now is the time to rethink old security practices predicated upon keeping everyone out, and then recovering quickly after that fails. Leading executives are starting to look at mitigating strategies as a security best practice.

Posted by: on July 14th, 2015

Competing on Trust

You compete on price. You compete on quality. You compete on marketing. You compete on location. But a new differentiator for consumer and enterprise businesses has emerged: trust.

Posted by: on March 9th, 2015

Leading Life Sciences Security

When a keystroke can kill, a partner website can reveal a billion dollars worth of research, or millions of patient records can be compromised, the stakes are as high as they can get in industry. What are life sciences companies to do?

Posted by: on March 9th, 2015

Buckle Up: Security Threats to Connected Cars Get Real

As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives. It’s a good question.

Posted by: on March 9th, 2015

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.