With security perimeters being breached on a regular basis, what can you really trust in your IT environment and how can you protect your critical assets? In this episode, Andrew Peters, Industry Director for Stealth at Unisys, explains the concept of Zero Trust, and why it is quickly becoming the de facto security posture for organizations around the world.
As COVID-19 distracts our attention, malicious cyber attackers see this as an opportunity to exploit any gaps in our control measures to get what they desire. As the saying goes, “never let a good crisis go to waste”! The good news is that there are a few simple things that we can focus on to reduce our attack surface and show resilience in the face of adversity.
With critical infrastructure increasingly dependent on the internet and cybersecurity attacks on the rise, cybersecurity and national security are now on the same footing. In this episode, Unisys Chief Trust Officer Tom Patterson discusses how the U.S. Cybersecurity Moonshot initiative is developing a set of recommendations for a safer, more resilient internet to deliver government and critical infrastructure services.
The blog is focusing on building trust in banking security, which is based one one of top 3 key findings from BankingInsights launched in APAC.The blog is focusing on building trust in banking security, which is based one one of top 3 key findings from BankingInsights launched in APAC.
The Zero Trust security movement has taken hold—and being asked to not trust by default is discouraging. However, when positioning the Unisys contribution to Zero Trust architecture, I became more sanguine about the prospect of applying an identity-driven cybersecurity approach that relies on data obfuscation, security analytics and automation, and that never assumes trust.