Posts tagged for “Zero Trust”

Security in a Zero Trust World

Ep. 5: Zero Trust

April 7th, 2020

With security perimeters being breached on a regular basis, what can you really trust in your IT environment and how can you protect your critical assets? In this episode, Andrew Peters, Industry Director for Stealth at Unisys, explains the concept of Zero Trust, and why it is quickly becoming the de facto security posture for organizations around the world.

Continue reading...

APAC Voices

COVID-19: Implications for Cybersecurity and CISOs

April 7th, 2020

As COVID-19 distracts our attention, malicious cyber attackers see this as an opportunity to exploit any gaps in our control measures to get what they desire. As the saying goes, “never let a good crisis go to waste”! The good news is that there are a few simple things that we can focus on to reduce our attack surface and show resilience in the face of adversity.

Continue reading...

Security in a Zero Trust World

Ep. 1: Cybersecurity Moonshot

February 25th, 2020

With critical infrastructure increasingly dependent on the internet and cybersecurity attacks on the rise, cybersecurity and national security are now on the same footing. In this episode, Unisys Chief Trust Officer Tom Patterson discusses how the U.S. Cybersecurity Moonshot initiative is developing a set of recommendations for a safer, more resilient internet to deliver government and critical infrastructure services.

Continue reading...

APAC Voices

Trusting in Bank Security

July 1st, 2019

The blog is focusing on building trust in banking security, which is based one one of top 3 key findings from BankingInsights launched in APAC.The blog is focusing on building trust in banking security, which is based one one of top 3 key findings from BankingInsights launched in APAC.

Continue reading...

Security

Zero Trust Realized

November 14th, 2018

The Zero Trust security movement has taken hold—and being asked to not trust by default is discouraging. However, when positioning the Unisys contribution to Zero Trust architecture, I became more sanguine about the prospect of applying an identity-driven cybersecurity approach that relies on data obfuscation, security analytics and automation, and that never assumes trust.

Continue reading...