Is the Cloud Secure?
When talking about moving applications, data, and users to the cloud, security is always the first concern. IT leaders proposing a cloud computing strategy have to deal with two seemingly conflicting...
View ArticleDo Those E-mail Scams Work on Anyone?
This is the same guy who wired money to that “friend” overseas who promised to pay him back double. Enjoy your Friday Funny. Click the image to enlarge, and copy the permalink to share with friends!
View ArticleThis Cartoon is Password Protected
You can’t fix what you can’t measure! Click the image to enlarge, and copy the permalink to share with friends.
View ArticleAt a Glance: America’s Top Security Concerns
Unisys has been conducting the bi-annual Unisys Security Index since 2007 to gauge consumer security perceptions around the world. In the United States, we interview more than 1,000 consumers every six...
View ArticleFinally! A simple solution for mobile device security
After months of research, IT finally found a foolproof way to get employees to comply with security policy. Download the permalink to share with friends!
View ArticleSecurity Straight Talk: Cracking the Code at The Security Intersection of...
Letter from the Editor 12-week Conversation on Securing a Borderless Enterprise: Join Us! A global team of Unisys Security experts and consultants invite you to this twelve-week long blog conversation...
View ArticleUnisys in the World: Protected Identities and Remote Banking in Cartagena,...
Steve Vinsik was recently in Cartagena, Columbia, presenting protecting identities concept on secure remote banking at the 11th Strategic Congress on Technology and Financial Marketing Conference known...
View ArticleCaution Against Over-Regulation of the Borderless Cyber Enterprise
I recently spent some time with Gholam Sheibani. He is one Unisys’ key subject matter expert in Security. We had an interesting discussion around over-regulating in this new cybersecurity space across...
View ArticleBuilding Castles in the Sky: Mobile Hacking and Its Impact on CyberSecurity
Today we are featuring a special guest blogger, Tom Kellerman, Commissioner on The Commission on Cyber Security for the 44th Presidency of the United States of America. Just a few key questions, and we...
View ArticleCISO Uncovers a Few Surprises and Shares Unisys Best Practices with European...
[Sowmya Murthy] Patti, where were you recently talking to clients, and what topic(s) were you discussing? [Patricia Titus] I recently traveled to Belgium and Holland for meetings with clients and...
View ArticleYear in the Rear View Mirror: Part II
Last week I highlighted Jan Wiewiora and the “how’s” of Preventing Data Leaks Before They Occur. This week I want to bring your attention to one of our most recent additions, Richard Bryant. He is a...
View Article
More Pages to Explore .....