Security

Security Measures that Build Trust


Executive Conversations

My “Seasonal Seven” Tips for Secure Online Holiday Shopping

November 27th, 2018

Unisys helps many of the largest brands and consumer companies around the world secure their customer’s data, but there are several things consumers can do as well to help protect their identity, privacy, and money in these holiday times.Unisys helps many of the largest brands and consumer companies around the world secure their customer’s data, but there are several things consumers can do as well to help protect their identity, privacy, and money in these holiday times.

Continue reading...

Security

Is Your Cybersecurity Program Ready for the Board Room?

November 21st, 2018

Gartner estimates, “By 2020, 100 percent of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually.” In today’s digital world, cybersecurity is so fundamental to an organization’s success that it needs to be managed like other business decisions. This requires articulating value in the same way as the rest of the business—using the language of finance. However, according to a Marsh-Microsoft Cyber Perception Survey, only 11 percent of organizations express cyber risk exposure in economic terms.

Continue reading...

APAC Voices

Unisys and the Invictus Games Sydney 2018: An Adaptive Mindset

November 19th, 2018

Anthony WIlson, the Technical Enagement Leader for Unisys at the Invictus Games Sydney 2018 explains how Unisys applied an "adaptive mindset" to provide the IT and cybersecurity support for one of the world's most inspirational sporting events.Anthony WIlson, the Technical Enagement Leader for Unisys at the Invictus Games Sydney 2018 explains how Unisys applied an "adaptive mindset" to provide the IT and cybersecurity support for one of the world's most inspirational sporting events.

Continue reading...

Security

Zero Trust Realized

November 14th, 2018

The Zero Trust security movement has taken hold—and being asked to not trust by default is discouraging. However, when positioning the Unisys contribution to Zero Trust architecture, I became more sanguine about the prospect of applying an identity-driven cybersecurity approach that relies on data obfuscation, security analytics and automation, and that never assumes trust.

Continue reading...

APAC Voices

Unisys Switches on Security and Turns up the Tech at Invictus Games Sydney 2018

October 19th, 2018

From 20 October 2018, 500 competitors from 18 nations will take part in 11 medal sports as part of the Invictus Games Sydney 2018 for wounded, injured and ill service men and women, both active duty and veterans.From 20 October 2018, 500 competitors from 18 nations will take part in 11 medal sports as part of the Invictus Games Sydney 2018 for wounded, injured and ill service men and women, both active duty and veterans.

Continue reading...

Security

Data Security – The Non-Obvious Facets

August 27th, 2018

A lot is already known and experienced about data security. This blog tries to slice and dice the data security paradigm differently, with the aim of providing a different perspective. The hope is that, different perspectives lead to different viewpoints, thoughts, realizations and ideas. If this blog creates a new thought or idea, and leads to an ‘aha’ moment, then it’s a purpose well served.

Continue reading...

Security

TrustCheck: Challenging Assumptions in Cyber Risk Management

July 27th, 2018

When I was 12 years old, my dad told me, “Never assume, it makes an ass out of u and me.” I don’t recall the context of the discussion, but I do remember responding appropriately with a groan. As I got older, I realized that assumptions are a necessary part of decision-making. But it’s also wise to challenge those assumptions—any time I start to question mine, I think back to that #DadJoke. Cyber risk management is heavily dependent on assumptions. As security leaders, we rely on heat maps, vulnerability counts and patches.... read more.

Continue reading...

Security

Modern Tools for Today’s Growing Threat Landscape

July 27th, 2018

Warmer days bring greener landscape, but with this growth comes maintenance, such as weekly grass trimming. The lawn mower has evolved from sheep, to scythe, to reel cutter, to engine-powered blades—now in the computer age, it uses automation to mow consistently and constantly. Trading my gas-powered lawn mower for a robotic one, I finally decided to stop applying 20th century technology to my 21st century landscape. So why are we not doing the same for cybersecurity?

Continue reading...

APAC Voices

Why Do Some Travellers Resist the Use of Biometrics?

June 27th, 2018

The Unisys Security Index revealed that 75% were willing to use a biometric to confirm their identity at an automated boarding gate when boarding a flight and 71% were willing to use a biometric to identify themselves as a frequent traveller of low security risk. This is good news for government agencies, airports and airlines that are expanding the use of biometrics as part of a seamless and secure travel experience. But it begs a question. Why are over 20% of travellers UNWILLING to use a biometric to identify themselves when travelling?The Unisys Security Index revealed that 75% were willing to use a biometric to confirm their identity at an automated boarding gate when boarding a flight and 71% were willing to use a biometric to identify themselves as a frequent traveller of low security risk. This is good news for government agencies, airports and airlines that are expanding the use of biometrics as part of a seamless and secure travel experience. But it begs a question. Why are over 20% of travellers UNWILLING to use a biometric to identify themselves when travelling?

Continue reading...

Security

Protect the Critical: A New Approach to Cybersecurity

June 15th, 2018

With increasing demand for the free flow of data to conduct daily life, businesses and governments are forced to rethink how they made data and systems available. For security professionals, protecting the critical has become a boardroom concern of how to increase productivity without putting the organization at risk.

Continue reading...