The Seismic Shift in Security: Part 3 – Information Security and the...
The rapid transformation in how and where society uses information has one overarching outcome: it ends the era of compartmentalized, bolt-on information security. Today we largely compartmentalize...
View ArticleWhen Cyber Attacks Become Physical
Recent reports of a cyber attack on a US water utility in Illinois again highlight the intrinsic link between cyber security, national infrastructure and what this means for national security. The idea...
View ArticleYear in the Rear View Mirror: Part I
As the blog editor, I spent some time reviewing and facilitating bloggers’ ideas. In doing so, I have the privilege of working with some brilliant minds at Unisys who spend most of their time...
View ArticleYear in the Rear View Mirror: Part II
Last week I highlighted Jan Wiewiora and the “how’s” of Preventing Data Leaks Before They Occur. This week I want to bring your attention to one of our most recent additions, Richard Bryant. He is a...
View ArticleYear in the Rear View Mirror: Part III
Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...
View ArticleMobile Christmas Shopping – Balancing Risk and Convenience
The ease of online shopping anytime of the day combined with the popularity of smartphones and tablets like the iPad means that this year many consumers will do their Christmas and holiday shopping...
View Article2012 IT Prediction: CyberSecurity Operations Take the Offensive with...
In our 2011 CyberSecurity predictions, we forecast that technologies such as biometrics and sophisticated monitoring applications would move to the forefront of the security discussion. As...
View Article2012 IT Predictions: Disruptive IT Trends Move Into the Fabric of...
The Unisys IT predictions for 2012 center around six Disruptive IT Trends that we introduced last year. A year ago we predicted that with cost-consciousness the “new normal,” organizations would tap...
View ArticleCan We Agree To Disagree?
There’s only one way to drive a nail with a hammer. You can only drive down a one-way street one way. And there’s only one way to calculate Pi. When it comes to IT strategies, however, there are few...
View ArticleCan We Agree to Disagree, Part II
This is the second in a three part point-counterpoint series of cybersecurity blog posts, where we are asking Unisys executives to share their contrasting views on IT topics of the day. We’ve launched...
View ArticleBorder Security for the Olympics
With less than 100 days before the Olympics it is worrying to hear concerns around the security and passenger traffic delays at the UK’s border with thunderous rumbles from passengers, former senior...
View ArticleUnisys Security Index: Consumer Awareness Brings Expectations on Organizations
As we’ve conducted the Unisys Security Index over the past six years, we’ve seen a growing awareness of cyber threats among the general public. Interestingly, we are seeing new evidence of this in the...
View ArticleUS Consumers Appear to Believe All is Well in Cyberspace. It’s Not!
The Unisys Security Index for the first half of 2012 indicates 33% of respondents are “not concerned” about computer security in relation to viruses or unsolicited e-mails. This is up from 18% last...
View ArticleIt’s All About Strong Authentication
In any industry, real-time access to information is critical. In the healthcare industry, lives hang in the balance. Financial services companies need to extend credit to the right people at the right...
View Article360-Degree Visibility: Anything Less is a Costly Mistake
“Anonymous hacks Department of Justice, leaks 1.7GB of data” “Security Breaches Shake Confidence in Credit-Card Safety” “Britain’s Serious Organized Crime Agency website hit by cyber- attack” “Survey...
View ArticleCan We Agree to Disagree, Part III
Welcome to the final installment in our three part point-counterpoint series. In the first two posts, Unisys executives Nick Evans and Roberto Tavano debated “how much security is enough?” and “should...
View ArticleThe Stealth Mode – Protecting Business from the Inside Out
For CIOs around the world, cyber attacks have become the new normal. It’s rare to go a week or two without seeing front pages splashed with news of hackers trying to steal customer information or...
View ArticleA Stealthy Defense in Depth
It is easy for the best-planned perimeter defenses to be breached through human error, thereby making an entire organization or company vulnerable to hackers. Companies need to have defense in depth:...
View ArticleTreat Your Internal Environment as Hostile Territory
In October 2011, Unisys polled the public in 12 countries as part of the Unisys Security IndexTM and asked “What action you would take if you found out your personal information being held by an...
View ArticleMore CCTV Cameras in King Cross is Good News – But is it an Intelligent...
More cameras do not an effective solution make Unfortunately sometimes it takes an awful tragedy to initiate action. Perhaps this is because public outrage forces officials to look beyond the dollar. A...
View ArticleDisruptive Trends in 2013: New Challenges, New Opportunities for CIOs
Disruptive technologies such as cloud, mobile, social and big data, are all transformational IT trends that Unisys has been tracking for many years now and innovating within our portfolio. As we kick...
View ArticleCyberSecurity Trends in 2013: Evolving Threats Require Security Be Built-in,...
When we couple the ever increasing sophisticated nature of cyber-attacks with the complexities of virtual infrastructures, hybrid cloud models, and the explosive growth of mobility and bring your own...
View ArticleSOA Strikes Back!
Service orientation is a philosophy that’s been in circulation for a while now. Since the inception of Web services companies have sought to embrace SOA (Service Oriented Architecture). However, not...
View ArticleUnisys Universe! Conference
This year Unisys is hosting an all new Universe event. Unisys has put together a single event for partners and customers. Universe delivers strategic, tactical and technical insights in an interactive...
View ArticleMobile Security for the Enterprise
The growing use of smartphones at work and the need to implement BYOD means enterprise mobility is now a crucial business requirement. Forrester predicts that by 2016, 350 million employees will use...
View ArticlePOS Security Hacks: How to Keep the Bad Guys Out, Sensitive Data In
In 2013 corporations saw an unprecedented amount of cyber-attacks from hackers and fraudsters. Hackers were able to successfully shut down websites, tamper with and steal enterprise intellectual...
View ArticleMicrosoft End-of-Support for Windows XP Date Approaching: Can’t Migrate then...
Microsoft End-of-Support for Windows XP is April 8, 2014. Despite recommendations for migration to Windows 7/8, estimates show that XP still powers one out of every four corporate PCs. Budget...
View ArticleConsumers Aren’t Worried About Internet Security? That’s Worrisome
Each year, the media coverage of cyber attacks, data breaches, computer viruses and other cybersecurity dangers becomes more dire and frightening. The past year was no different, with several high...
View ArticleSecuring Critical Infrastructure Needs Technology with Attitude
Critical infrastructure organizations across the globe rely on supervisory control and data acquisition (SCADA) and industrial control systems (ICS) to keep operations going 100 percent of the time...
View ArticleCybersecurity Strategy Series – Part 1: Setting the Context
We certainly live in interesting times. One might argue we have seen better ones, but the point I wish to make is different. All throughout history, times of change have given rise to new ideas,...
View ArticleSensitive Data Protection: 3 Reasons for the Vanishing Perimeter
Protecting sensitive data has become a complex proposition for a majority of organizations. The network perimeter of the past has vanished and data can no longer be contained, let alone protected....
View ArticleCybersecurity Strategy Series – Part 2: Options for an Effective...
In your house you have various rooms that let you enjoy a high-quality life, each one offering you some cherished functionality: kitchen, dining, billiard, study, library, fitness, music, sleeping …...
View ArticleEnterprise Governance, Risk, and Compliance (eGRC) – Managing Risk in the...
Over the last 25 years that I have been managing technology, and more specifically, security technology, the one predominant battle that many of my peers have been waging, and generally losing, is the...
View ArticleCybersecurity Strategy Series — Part 3: The Roadmap Towards a Cyber-resilient...
In my previous posts — Cybersecurity Strategy Series – Part 1: Setting the Context and Cybersecurity Strategy Series – Part 2: Options for an Effective Cybersecurity Strategy — I observed how current...
View ArticleSurvey Points to Security Concerns over SCADA/Industrial Control Systems
Over the last decade, the various financial crises have pushed companies in every industry to improve efficiency and cut costs wherever they can. The recent ability to attach just about anything to the...
View ArticleThree Key Steps to Sensitive Data Protection
At the heart of every security strategy is the objective to protect sensitive information from unauthorized disclosure. Whether you’re designing a defense-in-depth approach to security, or addressing...
View Article5 Tips for Consumers for Online Safety
With National Cyber Security Awareness Month kicking off this month with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a cyber-incident,...
View Article5 Tips for the Secure Development of IT Products
With National Cyber Security Awareness Month well underway this month with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a...
View Article3 Tips for Critical Infrastructure Protection
As citizens, most of us take for granted that electricity will make our lights glow the moment we flip a switch, that fresh drinking water will be available the moment we turn a faucet handle, and that...
View Article5 Key Security Considerations for SMBs in 2015
In the U.S., October marks National Cyber Security Awareness Month, and as the New Year fast approaches, small and medium-sized companies are either starting or in the middle of planning their...
View ArticleThe Benefits of Access Governance – The New Baseline for Identity Management
The need to identify users, control what they can access, and audit their activities is fundamental to information security. According to the Gartner Magic Quadrant for Identity Governance and...
View Article4 Tips for Organizations to Combat Cybercrime
Earlier this year, newspapers reported that for the first time, the U.S. had filed criminal charges against five Chinese military officers. This was the first time Washington singled out a foreign...
View ArticleData Center Security – Thinking Beyond Perimeter-based Defenses
In today’s information-centric world, the heart of any enterprise undoubtedly lies in its data center. With virtualization now a mainstream technology, workloads are increasingly being migrated to and...
View ArticleEnd to End Security in the Cloud – Securing Your AWS Workloads
When we consider cloud security we still focus on the same tenets of defense in depth and defense in breadth as in any traditional infrastructure. What this really means is that we consider...
View ArticleTime to FREAK Out?
Another day, another media-hyped vulnerability supposedly threatening the viability of the Internet. This latest one originated with attempts by the US government to control (read “weaken”) the level...
View ArticleNo Time to Think Differently – It’s Time to Move: Speed is Everything When It...
“The Chinese have penetrated every major corporation of any consequence in the United States and taken information,” said former NSA director Mike McConnell in a speech he delivered on March 13,...
View ArticleAdvance Your Approach to Ensure Security Against Advanced Threats
5 Things You’re Doing…But Are You Doing Them Well? Security is not just a discussion of business and technology anymore. Major enterprise security and data breach incidents in recent years, and...
View ArticleAn Upbeat Mood: Impressions of the 2015 RSA Conference
The annual RSA Security Conference was held last week at the Moscone Center in downtown San Francisco. The conference was bigger than ever, with 32,000 total attendees (many come for a day just to see...
View ArticleLook, We Don’t Catch the Smart Ones
Every year at the RSA Conference, the opening set of keynotes includes a “Cryptographers Panel.” This is understandable since RSA has its roots in the invention of public key encryption, but quite...
View ArticleContinuous Compliance…Moving Beyond a Checklist Mentality
Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future...
View Article
More Pages to Explore .....