Quantcast
Channel: Disruptive IT Trends » CyberSecurity
Browsing latest articles
Browse All 77 View Live

The Seismic Shift in Security: Part 3 – Information Security and the...

The rapid transformation in how and where society uses information has one overarching outcome: it ends the era of compartmentalized, bolt-on information security. Today we largely compartmentalize...

View Article



Image may be NSFW.
Clik here to view.

When Cyber Attacks Become Physical

Recent reports of a cyber attack on a US water utility in Illinois again highlight the intrinsic link between cyber security, national infrastructure and what this means for national security. The idea...

View Article

Year in the Rear View Mirror: Part I

As the blog editor, I spent some time reviewing and facilitating bloggers’ ideas. In doing so, I have the privilege of working with some brilliant minds at Unisys who spend most of their time...

View Article

Year in the Rear View Mirror: Part II

Last week I highlighted Jan Wiewiora and the “how’s” of Preventing Data Leaks Before They Occur. This week I want to bring your attention to one of our most recent additions, Richard Bryant.  He is a...

View Article

Year in the Rear View Mirror: Part III

Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...

View Article


Mobile Christmas Shopping – Balancing Risk and Convenience

The ease of online shopping anytime of the day combined with the popularity of smartphones and tablets like the iPad means that this year many consumers will do their Christmas and holiday shopping...

View Article

2012 IT Prediction: CyberSecurity Operations Take the Offensive with...

In our 2011 CyberSecurity predictions, we forecast that technologies such as biometrics and sophisticated monitoring applications would move to the forefront of the security discussion. As...

View Article

2012 IT Predictions: Disruptive IT Trends Move Into the Fabric of...

The Unisys IT predictions for 2012 center around six Disruptive IT Trends that we introduced last year.  A year ago we predicted that with cost-consciousness the “new normal,” organizations would tap...

View Article


Image may be NSFW.
Clik here to view.

Can We Agree To Disagree?

There’s only one way to drive a nail with a hammer. You can only drive down a one-way street one way. And there’s only one way to calculate Pi. When it comes to IT strategies, however, there are few...

View Article


Image may be NSFW.
Clik here to view.

Can We Agree to Disagree, Part II

This is the second in a three part point-counterpoint series of cybersecurity blog posts, where we are asking Unisys executives to share their contrasting views on IT topics of the day. We’ve launched...

View Article

Border Security for the Olympics

With less than 100 days before the Olympics it is worrying to hear concerns around the security and passenger traffic delays at the UK’s border with thunderous rumbles from passengers, former senior...

View Article

Unisys Security Index: Consumer Awareness Brings Expectations on Organizations

As we’ve conducted the Unisys Security Index over the past six years, we’ve seen a growing awareness of cyber threats among the general public. Interestingly, we are seeing new evidence of this in the...

View Article

US Consumers Appear to Believe All is Well in Cyberspace. It’s Not!

The Unisys Security Index for the first half of 2012 indicates 33% of respondents are “not concerned” about computer security in relation to viruses or unsolicited e-mails.  This is up from 18% last...

View Article


Image may be NSFW.
Clik here to view.

It’s All About Strong Authentication

In any industry, real-time access to information is critical. In the healthcare industry, lives hang in the balance. Financial services companies need to extend credit to the right people at the right...

View Article

360-Degree Visibility: Anything Less is a Costly Mistake

“Anonymous hacks Department of Justice, leaks 1.7GB of data” “Security Breaches Shake Confidence in Credit-Card Safety” “Britain’s Serious Organized Crime Agency website hit by cyber- attack” “Survey...

View Article


Image may be NSFW.
Clik here to view.

Can We Agree to Disagree, Part III

Welcome to the final installment in our three part point-counterpoint series. In the first two posts, Unisys executives Nick Evans and Roberto Tavano debated “how much security is enough?” and “should...

View Article

The Stealth Mode – Protecting Business from the Inside Out

For CIOs around the world, cyber attacks have become the new normal. It’s rare to go a week or two without seeing front pages splashed with news of hackers trying to steal customer information or...

View Article


A Stealthy Defense in Depth

It is easy for the best-planned perimeter defenses to be breached through human error, thereby making an entire organization or company vulnerable to hackers.  Companies need to have defense in depth:...

View Article

Image may be NSFW.
Clik here to view.

Treat Your Internal Environment as Hostile Territory

In October 2011, Unisys polled the public in 12 countries as part of the Unisys Security IndexTM and asked “What action you would take if you found out your personal information being held by an...

View Article

More CCTV Cameras in King Cross is Good News – But is it an Intelligent...

More cameras do not an effective solution make Unfortunately sometimes it takes an awful tragedy to initiate action. Perhaps this is because public outrage forces officials to look beyond the dollar. A...

View Article

Disruptive Trends in 2013: New Challenges, New Opportunities for CIOs

Disruptive technologies such as cloud, mobile, social and big data, are all transformational IT trends that Unisys has been tracking for many years now and innovating within our portfolio. As we kick...

View Article


CyberSecurity Trends in 2013: Evolving Threats Require Security Be Built-in,...

When we couple the ever increasing sophisticated nature of cyber-attacks with the complexities of virtual infrastructures, hybrid cloud models, and the explosive growth of mobility and bring your own...

View Article


SOA Strikes Back!

Service orientation is a philosophy that’s been in circulation for a while now. Since the inception of Web services companies have sought to embrace SOA (Service Oriented Architecture). However, not...

View Article

Unisys Universe! Conference

This year Unisys is hosting an all new Universe event. Unisys has put together a single event for partners and customers. Universe delivers strategic, tactical and technical insights in an interactive...

View Article

Mobile Security for the Enterprise

The growing use of smartphones at work and the need to implement BYOD means enterprise mobility is now a crucial business requirement. Forrester predicts that by 2016, 350 million employees will use...

View Article


POS Security Hacks: How to Keep the Bad Guys Out, Sensitive Data In

In 2013 corporations saw an unprecedented amount of cyber-attacks from hackers and fraudsters. Hackers were able to successfully shut down websites, tamper with and steal enterprise intellectual...

View Article

Microsoft End-of-Support for Windows XP Date Approaching: Can’t Migrate then...

Microsoft End-of-Support for Windows XP is April 8, 2014. Despite recommendations for migration to Windows 7/8, estimates show that XP still powers one out of every four corporate PCs.   Budget...

View Article

Consumers Aren’t Worried About Internet Security? That’s Worrisome

Each year, the media coverage of cyber attacks, data breaches, computer viruses and other cybersecurity dangers becomes more dire and frightening. The past year was no different, with several high...

View Article

Securing Critical Infrastructure Needs Technology with Attitude

Critical infrastructure organizations across the globe rely on supervisory control and data acquisition (SCADA) and industrial control systems (ICS) to keep operations going 100 percent of the time...

View Article



Cybersecurity Strategy Series – Part 1: Setting the Context

We certainly live in interesting times. One might argue we have seen better ones, but the point I wish to make is different. All throughout history, times of change have given rise to new ideas,...

View Article

Sensitive Data Protection: 3 Reasons for the Vanishing Perimeter

Protecting sensitive data has become a complex proposition for a majority of organizations.  The network perimeter of the past has vanished and data can no longer be contained, let alone protected....

View Article

Cybersecurity Strategy Series – Part 2: Options for an Effective...

In your house you have various rooms that let you enjoy a high-quality life, each one offering you some cherished functionality: kitchen, dining, billiard, study, library, fitness, music, sleeping …...

View Article

Enterprise Governance, Risk, and Compliance (eGRC) – Managing Risk in the...

Over the last 25 years that I have been managing technology, and more specifically, security technology, the one predominant battle that many of my peers have been waging, and generally losing, is the...

View Article


Cybersecurity Strategy Series — Part 3: The Roadmap Towards a Cyber-resilient...

In my previous posts — Cybersecurity Strategy Series – Part 1: Setting the Context and Cybersecurity Strategy Series – Part 2: Options for an Effective Cybersecurity Strategy — I observed how current...

View Article

Survey Points to Security Concerns over SCADA/Industrial Control Systems

Over the last decade, the various financial crises have pushed companies in every industry to improve efficiency and cut costs wherever they can. The recent ability to attach just about anything to the...

View Article

Three Key Steps to Sensitive Data Protection

At the heart of every security strategy is the objective to protect sensitive information from unauthorized disclosure. Whether you’re designing a defense-in-depth approach to security, or addressing...

View Article


5 Tips for Consumers for Online Safety

With National Cyber Security Awareness Month kicking off this month with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a cyber-incident,...

View Article


5 Tips for the Secure Development of IT Products

With National Cyber Security Awareness Month well underway this month with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a...

View Article

3 Tips for Critical Infrastructure Protection

As citizens, most of us take for granted that electricity will make our lights glow the moment we flip a switch, that fresh drinking water will be available the moment we turn a faucet handle, and that...

View Article

5 Key Security Considerations for SMBs in 2015

In the U.S., October marks National Cyber Security Awareness Month, and as the New Year fast approaches, small and medium-sized companies are either starting or in the middle of planning their...

View Article

The Benefits of Access Governance – The New Baseline for Identity Management

The need to identify users, control what they can access, and audit their activities is fundamental to information security. According to the Gartner Magic Quadrant for Identity Governance and...

View Article


4 Tips for Organizations to Combat Cybercrime

Earlier this year, newspapers reported that for the first time, the U.S. had filed criminal charges against five Chinese military officers. This was the first time Washington singled out a foreign...

View Article

Data Center Security – Thinking Beyond Perimeter-based Defenses

In today’s information-centric world, the heart of any enterprise undoubtedly lies in its data center. With virtualization now a mainstream technology, workloads are increasingly being migrated to and...

View Article


End to End Security in the Cloud – Securing Your AWS Workloads

When we consider cloud security we still focus on the same tenets of defense in depth and defense in breadth as in any traditional infrastructure. What this really means is that we consider...

View Article

Time to FREAK Out?

Another day, another media-hyped vulnerability supposedly threatening the viability of the Internet.  This latest one originated with attempts by the US government to control (read “weaken”) the level...

View Article


No Time to Think Differently – It’s Time to Move: Speed is Everything When It...

“The Chinese have penetrated every major corporation of any consequence in the United States and taken information,” said former NSA director Mike McConnell in a speech he delivered on March 13,...

View Article

Image may be NSFW.
Clik here to view.

Advance Your Approach to Ensure Security Against Advanced Threats

5 Things You’re Doing…But Are You Doing Them Well? Security is not just a discussion of business and technology anymore. Major enterprise security and data breach incidents in recent years, and...

View Article

An Upbeat Mood: Impressions of the 2015 RSA Conference

The annual RSA Security Conference was held last week at the Moscone Center in downtown San Francisco.  The conference was bigger than ever, with 32,000 total attendees (many come for a day just to see...

View Article

Look, We Don’t Catch the Smart Ones

Every year at the RSA Conference, the opening set of keynotes includes a “Cryptographers Panel.”  This is understandable since RSA has its roots in the invention of public key encryption, but quite...

View Article


Continuous Compliance…Moving Beyond a Checklist Mentality

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future...

View Article

Browsing latest articles
Browse All 77 View Live




Latest Images