CyberSecurity — Key to Unlocking Innovation Around Today’s Disruptive Trends
In addition to grappling with the increasing sophistication, frequency and scale of cybercrime, today’s CIOs and CISOs are being confronted with an increasingly porous IT security perimeter. Among...
View ArticleThe Six Biggest Hacking Threats and How to Deal with Them
There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...
View ArticleTheft by Hacking: Three of the Top Six Threats (Part I)
In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...
View ArticleAnother Company Reconsiders Do-It-Yourself IT
Click the image to enlarge, and copy the permalink to share with friends!
View ArticleUnderstanding the Hacker
Many of you, like me, will be aware of the online conference organisation TED (Technology, Education and Design). The conferences are first class, easily digestible and recently featured a journalist –...
View ArticleMichigan Cyber Summit – Unisys Takes Part in National Cyber Security...
I just came back from the Michigan Cyber Summit that was hosted by Governor Rick Snyder and Michigan CIO David Behen. This event was the launch site for the National Cyber Security Awareness Month with...
View ArticleConsumerization of IT: Moving Beyond Security Concerns for IT Organizations,...
Understand the security requirements – security considerations are part of every aspect of secure mobility. From the devices you decide to support, the applications and access you provide, the...
View ArticleHow Are Asia Pacific Enterprises Responding To The Consumerization Of IT?
The top 10 observations about Enterprise Mobility from Consumerization of IT research briefings. Over the past few months, Unisys has been briefing Asia Pacific organizations on the findings of its...
View ArticleCybercriminals Are Here To Stay
Continuous cyber-attacks represent a growing concern in our business and personal lives. Countering the increasing number of assaults and their ever-growing complexity is no easy call. In fact I...
View ArticleCan Law Enforcement Keep Up With Technology?
The past 12 months have highlighted the increasing gap between the ability of law enforcement to keep up with advances in technology in the UK. For instance just this year we’ve seen; court...
View ArticleDo We Have the Right Skills to Help Close The Gap Between the Law Profession...
The Unisys Security Index, announced on Wednesday 8th November 2011, tracks consumer’s concerns about national, personal, financial and online security every six months. In the latest report it was...
View ArticleThe Seismic Shift in Security: Part 1 – The Increasing Value of Information
I don’t have to tell you that there’s a sea change underway in how society uses information. But there is something not immediately obvious about this change: How society’s dependencies are migrating...
View ArticleThe Seismic Shift in Security: Part 2 – Information Push, Information Pull
As I said in “The Seismic Shift in Security: Part 1 – The Increasing Value of Information”, we often fail to notice how our dependencies are moving from the real world to the digitally networked world....
View ArticleThe Seismic Shift in Security: Part 3 – Information Security and the...
The rapid transformation in how and where society uses information has one overarching outcome: it ends the era of compartmentalized, bolt-on information security. Today we largely compartmentalize...
View ArticleWhen Cyber Attacks Become Physical
Recent reports of a cyber attack on a US water utility in Illinois again highlight the intrinsic link between cyber security, national infrastructure and what this means for national security. The idea...
View ArticleYear in the Rear View Mirror: Part I
As the blog editor, I spent some time reviewing and facilitating bloggers’ ideas. In doing so, I have the privilege of working with some brilliant minds at Unisys who spend most of their time...
View ArticleYear in the Rear View Mirror: Part III
Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...
View ArticleSocial Collaboration Brings Crucial Value to the Enterprise
Today business teams are more global and mobile than ever, working on more complex products and services with less time to deliver. They need to be equipped with better tools to be productive and...
View Article2012 IT Prediction: CyberSecurity Operations Take the Offensive with...
In our 2011 CyberSecurity predictions, we forecast that technologies such as biometrics and sophisticated monitoring applications would move to the forefront of the security discussion. As...
View Article2012 IT Prediction: IT Appliances Accelerate IT Initiatives around Cloud, IT...
IT Appliances are packaged solutions consisting of the hardware and software needed to deliver a specific set of IT functionality. Best practices for setup, configuration and use of these appliances...
View Article2012 IT Predictions: Disruptive IT Trends Move Into the Fabric of...
The Unisys IT predictions for 2012 center around six Disruptive IT Trends that we introduced last year. A year ago we predicted that with cost-consciousness the “new normal,” organizations would tap...
View ArticleCan We Agree To Disagree?
There’s only one way to drive a nail with a hammer. You can only drive down a one-way street one way. And there’s only one way to calculate Pi. When it comes to IT strategies, however, there are few...
View ArticleCan We Agree to Disagree, Part II
This is the second in a three part point-counterpoint series of cybersecurity blog posts, where we are asking Unisys executives to share their contrasting views on IT topics of the day. We’ve launched...
View ArticleUS Consumers Appear to Believe All is Well in Cyberspace. It’s Not!
The Unisys Security Index for the first half of 2012 indicates 33% of respondents are “not concerned” about computer security in relation to viruses or unsolicited e-mails. This is up from 18% last...
View ArticleIt’s All About Strong Authentication
In any industry, real-time access to information is critical. In the healthcare industry, lives hang in the balance. Financial services companies need to extend credit to the right people at the right...
View Article360-Degree Visibility: Anything Less is a Costly Mistake
“Anonymous hacks Department of Justice, leaks 1.7GB of data” “Security Breaches Shake Confidence in Credit-Card Safety” “Britain’s Serious Organized Crime Agency website hit by cyber- attack” “Survey...
View ArticleCan We Agree to Disagree, Part III
Welcome to the final installment in our three part point-counterpoint series. In the first two posts, Unisys executives Nick Evans and Roberto Tavano debated “how much security is enough?” and “should...
View ArticleThe Stealth Mode – Protecting Business from the Inside Out
For CIOs around the world, cyber attacks have become the new normal. It’s rare to go a week or two without seeing front pages splashed with news of hackers trying to steal customer information or...
View ArticleA Stealthy Defense in Depth
It is easy for the best-planned perimeter defenses to be breached through human error, thereby making an entire organization or company vulnerable to hackers. Companies need to have defense in depth:...
View ArticleCyberSecurity Trends in 2013: Evolving Threats Require Security Be Built-in,...
When we couple the ever increasing sophisticated nature of cyber-attacks with the complexities of virtual infrastructures, hybrid cloud models, and the explosive growth of mobility and bring your own...
View ArticlePOS Security Hacks: How to Keep the Bad Guys Out, Sensitive Data In
In 2013 corporations saw an unprecedented amount of cyber-attacks from hackers and fraudsters. Hackers were able to successfully shut down websites, tamper with and steal enterprise intellectual...
View ArticleConsumers Aren’t Worried About Internet Security? That’s Worrisome
Each year, the media coverage of cyber attacks, data breaches, computer viruses and other cybersecurity dangers becomes more dire and frightening. The past year was no different, with several high...
View ArticleSecuring Critical Infrastructure Needs Technology with Attitude
Critical infrastructure organizations across the globe rely on supervisory control and data acquisition (SCADA) and industrial control systems (ICS) to keep operations going 100 percent of the time...
View ArticleCybersecurity Strategy Series – Part 1: Setting the Context
We certainly live in interesting times. One might argue we have seen better ones, but the point I wish to make is different. All throughout history, times of change have given rise to new ideas,...
View ArticleSensitive Data Protection: 3 Reasons for the Vanishing Perimeter
Protecting sensitive data has become a complex proposition for a majority of organizations. The network perimeter of the past has vanished and data can no longer be contained, let alone protected....
View ArticleCybersecurity Strategy Series – Part 2: Options for an Effective...
In your house you have various rooms that let you enjoy a high-quality life, each one offering you some cherished functionality: kitchen, dining, billiard, study, library, fitness, music, sleeping …...
View ArticleEnterprise Governance, Risk, and Compliance (eGRC) – Managing Risk in the...
Over the last 25 years that I have been managing technology, and more specifically, security technology, the one predominant battle that many of my peers have been waging, and generally losing, is the...
View ArticleCybersecurity Strategy Series — Part 3: The Roadmap Towards a Cyber-resilient...
In my previous posts — Cybersecurity Strategy Series – Part 1: Setting the Context and Cybersecurity Strategy Series – Part 2: Options for an Effective Cybersecurity Strategy — I observed how current...
View ArticleThree Key Steps to Sensitive Data Protection
At the heart of every security strategy is the objective to protect sensitive information from unauthorized disclosure. Whether you’re designing a defense-in-depth approach to security, or addressing...
View Article3 Tips for Critical Infrastructure Protection
As citizens, most of us take for granted that electricity will make our lights glow the moment we flip a switch, that fresh drinking water will be available the moment we turn a faucet handle, and that...
View Article5 Key Security Considerations for SMBs in 2015
In the U.S., October marks National Cyber Security Awareness Month, and as the New Year fast approaches, small and medium-sized companies are either starting or in the middle of planning their...
View Article4 Tips for Organizations to Combat Cybercrime
Earlier this year, newspapers reported that for the first time, the U.S. had filed criminal charges against five Chinese military officers. This was the first time Washington singled out a foreign...
View ArticleData Center Security – Thinking Beyond Perimeter-based Defenses
In today’s information-centric world, the heart of any enterprise undoubtedly lies in its data center. With virtualization now a mainstream technology, workloads are increasingly being migrated to and...
View ArticleBYOD: How to Achieve a Win-Win for Employee and Enterprise
As per the Wikipedia article on BYOD, Bring Your Own Device, the term BYOD began to gain prominence in 2011 when Unisys and Citrix Systems shared their perceptions of the trend. As per IDC, the...
View ArticleEnd to End Security in the Cloud – Securing Your AWS Workloads
When we consider cloud security we still focus on the same tenets of defense in depth and defense in breadth as in any traditional infrastructure. What this really means is that we consider...
View ArticleTime to FREAK Out?
Another day, another media-hyped vulnerability supposedly threatening the viability of the Internet. This latest one originated with attempts by the US government to control (read “weaken”) the level...
View ArticleNo Time to Think Differently – It’s Time to Move: Speed is Everything When It...
“The Chinese have penetrated every major corporation of any consequence in the United States and taken information,” said former NSA director Mike McConnell in a speech he delivered on March 13,...
View ArticleAdvance Your Approach to Ensure Security Against Advanced Threats
5 Things You’re Doing…But Are You Doing Them Well? Security is not just a discussion of business and technology anymore. Major enterprise security and data breach incidents in recent years, and...
View ArticleAn Upbeat Mood: Impressions of the 2015 RSA Conference
The annual RSA Security Conference was held last week at the Moscone Center in downtown San Francisco. The conference was bigger than ever, with 32,000 total attendees (many come for a day just to see...
View ArticleContinuous Compliance…Moving Beyond a Checklist Mentality
Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future...
View Article