Quantcast
Channel: Disruptive IT Trends » CyberSecurity
Browsing latest articles
Browse All 63 View Live

CyberSecurity — Key to Unlocking Innovation Around Today’s Disruptive Trends

In addition to grappling with the increasing sophistication, frequency and scale of cybercrime, today’s CIOs and CISOs are being confronted with an increasingly porous IT security perimeter. Among...

View Article



The Six Biggest Hacking Threats and How to Deal with Them

There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...

View Article

Theft by Hacking: Three of the Top Six Threats (Part I)

In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...

View Article

Image may be NSFW.
Clik here to view.

Another Company Reconsiders Do-It-Yourself IT

Click the image to enlarge, and copy the permalink to share with friends!

View Article

Understanding the Hacker

Many of you, like me, will be aware of the online conference organisation TED (Technology, Education and Design). The conferences are first class, easily digestible and recently featured a journalist –...

View Article


Michigan Cyber Summit – Unisys Takes Part in National Cyber Security...

I just came back from the Michigan Cyber Summit that was hosted by Governor Rick Snyder and Michigan CIO David Behen. This event was the launch site for the National Cyber Security Awareness Month with...

View Article

Consumerization of IT: Moving Beyond Security Concerns for IT Organizations,...

Understand the security requirements – security considerations are part of every aspect of secure mobility.  From the devices you decide to support, the applications and access you provide, the...

View Article

How Are Asia Pacific Enterprises Responding To The Consumerization Of IT?

The top 10 observations about Enterprise Mobility from Consumerization of IT research briefings. Over the past few months, Unisys has been briefing Asia Pacific organizations on the findings of its...

View Article


Cybercriminals Are Here To Stay

Continuous cyber-attacks represent a growing concern in our business and personal lives. Countering the increasing number of assaults and their ever-growing complexity is no easy call. In fact I...

View Article


Can Law Enforcement Keep Up With Technology?

The past 12 months have highlighted the increasing gap between the ability of law enforcement to keep up with  advances in technology in the UK. For instance just this year we’ve seen; court...

View Article

Do We Have the Right Skills to Help Close The Gap Between the Law Profession...

The Unisys Security Index, announced on Wednesday 8th November 2011, tracks consumer’s concerns about national, personal, financial and online security every six months. In the latest report it was...

View Article

The Seismic Shift in Security: Part 1 – The Increasing Value of Information

I don’t have to tell you that there’s a sea change underway in how society uses information. But there is something not immediately obvious about this change: How society’s dependencies are migrating...

View Article

The Seismic Shift in Security: Part 2 – Information Push, Information Pull

As I said in “The Seismic Shift in Security: Part 1 – The Increasing Value of Information”, we often fail to notice how our dependencies are moving from the real world to the digitally networked world....

View Article


The Seismic Shift in Security: Part 3 – Information Security and the...

The rapid transformation in how and where society uses information has one overarching outcome: it ends the era of compartmentalized, bolt-on information security. Today we largely compartmentalize...

View Article

Image may be NSFW.
Clik here to view.

When Cyber Attacks Become Physical

Recent reports of a cyber attack on a US water utility in Illinois again highlight the intrinsic link between cyber security, national infrastructure and what this means for national security. The idea...

View Article


Year in the Rear View Mirror: Part I

As the blog editor, I spent some time reviewing and facilitating bloggers’ ideas. In doing so, I have the privilege of working with some brilliant minds at Unisys who spend most of their time...

View Article

Year in the Rear View Mirror: Part III

Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...

View Article


Social Collaboration Brings Crucial Value to the Enterprise

Today business teams are more global and mobile than ever, working on more complex products and services with less time to deliver.  They need to be equipped with better tools to be productive and...

View Article

2012 IT Prediction: CyberSecurity Operations Take the Offensive with...

In our 2011 CyberSecurity predictions, we forecast that technologies such as biometrics and sophisticated monitoring applications would move to the forefront of the security discussion. As...

View Article

2012 IT Prediction: IT Appliances Accelerate IT Initiatives around Cloud, IT...

IT Appliances are packaged solutions consisting of the hardware and software needed to deliver a specific set of IT functionality.  Best practices for setup, configuration and use of these appliances...

View Article

2012 IT Predictions: Disruptive IT Trends Move Into the Fabric of...

The Unisys IT predictions for 2012 center around six Disruptive IT Trends that we introduced last year.  A year ago we predicted that with cost-consciousness the “new normal,” organizations would tap...

View Article


Image may be NSFW.
Clik here to view.

Can We Agree To Disagree?

There’s only one way to drive a nail with a hammer. You can only drive down a one-way street one way. And there’s only one way to calculate Pi. When it comes to IT strategies, however, there are few...

View Article


Image may be NSFW.
Clik here to view.

Can We Agree to Disagree, Part II

This is the second in a three part point-counterpoint series of cybersecurity blog posts, where we are asking Unisys executives to share their contrasting views on IT topics of the day. We’ve launched...

View Article

US Consumers Appear to Believe All is Well in Cyberspace. It’s Not!

The Unisys Security Index for the first half of 2012 indicates 33% of respondents are “not concerned” about computer security in relation to viruses or unsolicited e-mails.  This is up from 18% last...

View Article

Image may be NSFW.
Clik here to view.

It’s All About Strong Authentication

In any industry, real-time access to information is critical. In the healthcare industry, lives hang in the balance. Financial services companies need to extend credit to the right people at the right...

View Article


360-Degree Visibility: Anything Less is a Costly Mistake

“Anonymous hacks Department of Justice, leaks 1.7GB of data” “Security Breaches Shake Confidence in Credit-Card Safety” “Britain’s Serious Organized Crime Agency website hit by cyber- attack” “Survey...

View Article

Image may be NSFW.
Clik here to view.

Can We Agree to Disagree, Part III

Welcome to the final installment in our three part point-counterpoint series. In the first two posts, Unisys executives Nick Evans and Roberto Tavano debated “how much security is enough?” and “should...

View Article

The Stealth Mode – Protecting Business from the Inside Out

For CIOs around the world, cyber attacks have become the new normal. It’s rare to go a week or two without seeing front pages splashed with news of hackers trying to steal customer information or...

View Article

A Stealthy Defense in Depth

It is easy for the best-planned perimeter defenses to be breached through human error, thereby making an entire organization or company vulnerable to hackers.  Companies need to have defense in depth:...

View Article



CyberSecurity Trends in 2013: Evolving Threats Require Security Be Built-in,...

When we couple the ever increasing sophisticated nature of cyber-attacks with the complexities of virtual infrastructures, hybrid cloud models, and the explosive growth of mobility and bring your own...

View Article

POS Security Hacks: How to Keep the Bad Guys Out, Sensitive Data In

In 2013 corporations saw an unprecedented amount of cyber-attacks from hackers and fraudsters. Hackers were able to successfully shut down websites, tamper with and steal enterprise intellectual...

View Article

Consumers Aren’t Worried About Internet Security? That’s Worrisome

Each year, the media coverage of cyber attacks, data breaches, computer viruses and other cybersecurity dangers becomes more dire and frightening. The past year was no different, with several high...

View Article

Securing Critical Infrastructure Needs Technology with Attitude

Critical infrastructure organizations across the globe rely on supervisory control and data acquisition (SCADA) and industrial control systems (ICS) to keep operations going 100 percent of the time...

View Article


Cybersecurity Strategy Series – Part 1: Setting the Context

We certainly live in interesting times. One might argue we have seen better ones, but the point I wish to make is different. All throughout history, times of change have given rise to new ideas,...

View Article

Sensitive Data Protection: 3 Reasons for the Vanishing Perimeter

Protecting sensitive data has become a complex proposition for a majority of organizations.  The network perimeter of the past has vanished and data can no longer be contained, let alone protected....

View Article

Cybersecurity Strategy Series – Part 2: Options for an Effective...

In your house you have various rooms that let you enjoy a high-quality life, each one offering you some cherished functionality: kitchen, dining, billiard, study, library, fitness, music, sleeping …...

View Article


Enterprise Governance, Risk, and Compliance (eGRC) – Managing Risk in the...

Over the last 25 years that I have been managing technology, and more specifically, security technology, the one predominant battle that many of my peers have been waging, and generally losing, is the...

View Article


Cybersecurity Strategy Series — Part 3: The Roadmap Towards a Cyber-resilient...

In my previous posts — Cybersecurity Strategy Series – Part 1: Setting the Context and Cybersecurity Strategy Series – Part 2: Options for an Effective Cybersecurity Strategy — I observed how current...

View Article

Three Key Steps to Sensitive Data Protection

At the heart of every security strategy is the objective to protect sensitive information from unauthorized disclosure. Whether you’re designing a defense-in-depth approach to security, or addressing...

View Article

3 Tips for Critical Infrastructure Protection

As citizens, most of us take for granted that electricity will make our lights glow the moment we flip a switch, that fresh drinking water will be available the moment we turn a faucet handle, and that...

View Article

5 Key Security Considerations for SMBs in 2015

In the U.S., October marks National Cyber Security Awareness Month, and as the New Year fast approaches, small and medium-sized companies are either starting or in the middle of planning their...

View Article


4 Tips for Organizations to Combat Cybercrime

Earlier this year, newspapers reported that for the first time, the U.S. had filed criminal charges against five Chinese military officers. This was the first time Washington singled out a foreign...

View Article

Data Center Security – Thinking Beyond Perimeter-based Defenses

In today’s information-centric world, the heart of any enterprise undoubtedly lies in its data center. With virtualization now a mainstream technology, workloads are increasingly being migrated to and...

View Article


BYOD: How to Achieve a Win-Win for Employee and Enterprise

As per the Wikipedia article on BYOD, Bring Your Own Device, the term BYOD began to gain prominence in 2011 when Unisys and Citrix Systems shared their perceptions of the trend. As per IDC, the...

View Article

End to End Security in the Cloud – Securing Your AWS Workloads

When we consider cloud security we still focus on the same tenets of defense in depth and defense in breadth as in any traditional infrastructure. What this really means is that we consider...

View Article


Time to FREAK Out?

Another day, another media-hyped vulnerability supposedly threatening the viability of the Internet.  This latest one originated with attempts by the US government to control (read “weaken”) the level...

View Article

No Time to Think Differently – It’s Time to Move: Speed is Everything When It...

“The Chinese have penetrated every major corporation of any consequence in the United States and taken information,” said former NSA director Mike McConnell in a speech he delivered on March 13,...

View Article

Image may be NSFW.
Clik here to view.

Advance Your Approach to Ensure Security Against Advanced Threats

5 Things You’re Doing…But Are You Doing Them Well? Security is not just a discussion of business and technology anymore. Major enterprise security and data breach incidents in recent years, and...

View Article

An Upbeat Mood: Impressions of the 2015 RSA Conference

The annual RSA Security Conference was held last week at the Moscone Center in downtown San Francisco.  The conference was bigger than ever, with 32,000 total attendees (many come for a day just to see...

View Article


Continuous Compliance…Moving Beyond a Checklist Mentality

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future...

View Article

Browsing latest articles
Browse All 63 View Live


Latest Images