Posts tagged for “CyberSecurity”

Executive Conversations

My “Seasonal Seven” Tips for Secure Online Holiday Shopping

November 27th, 2018

Unisys helps many of the largest brands and consumer companies around the world secure their customer’s data, but there are several things consumers can do as well to help protect their identity, privacy, and money in these holiday times.Unisys helps many of the largest brands and consumer companies around the world secure their customer’s data, but there are several things consumers can do as well to help protect their identity, privacy, and money in these holiday times.

Continue reading...

Security

Zero Trust Realized

November 14th, 2018

The Zero Trust security movement has taken hold—and being asked to not trust by default is discouraging. However, when positioning the Unisys contribution to Zero Trust architecture, I became more sanguine about the prospect of applying an identity-driven cybersecurity approach that relies on data obfuscation, security analytics and automation, and that never assumes trust.

Continue reading...

APAC Voices

Unisys Switches on Security and Turns up the Tech at Invictus Games Sydney 2018

October 19th, 2018

From 20 October 2018, 500 competitors from 18 nations will take part in 11 medal sports as part of the Invictus Games Sydney 2018 for wounded, injured and ill service men and women, both active duty and veterans.From 20 October 2018, 500 competitors from 18 nations will take part in 11 medal sports as part of the Invictus Games Sydney 2018 for wounded, injured and ill service men and women, both active duty and veterans.

Continue reading...

Security

Protect the Critical: A New Approach to Cybersecurity

June 15th, 2018

With increasing demand for the free flow of data to conduct daily life, businesses and governments are forced to rethink how they made data and systems available. For security professionals, protecting the critical has become a boardroom concern of how to increase productivity without putting the organization at risk.

Continue reading...

European Voices

Innovation or Obliteration? How the Pharmaceutical Supply Chain Can Secure Itself from Attack

June 14th, 2018

The pharmaceutical industry is challenged with keeping up with the constant development of groundbreaking research, alongside the barrage of new innovations, regulations and digital technologies. As the sector charges full-speed into the digital age, how it responds to these stimuli, and how it adapts its business models, will be crucial in determining its success in creating the supply chains of tomorrow.The pharmaceutical industry is challenged with keeping up with the constant development of groundbreaking research, alongside the barrage of new innovations, regulations and digital technologies. As the sector charges full-speed into the digital age, how it responds to these stimuli, and how it adapts its business models, will be crucial in determining its success in creating the supply chains of tomorrow.

Continue reading...

Security

Managing Risk through Predictive Analytics

December 15th, 2017

Cyberattacks and threats continue to increase and their impact to business operations are becoming more detrimental. Security operations personnel are utilizing data received from monitoring systems to develop usage patterns and behaviors which predict the expected actions inside and outside a network. Are you geared up enough?

Continue reading...