Quantcast
Channel: Disruptive IT Trends » Data Privacy Day
Browsing latest articles
Browse All 19 View Live

Image may be NSFW.
Clik here to view.

Data Privacy Day: Jan. 28, 2011

Jan. 28 has been designated as Data Privacy Day, described by think tank The Privacy Projects as “an international celebration of the dignity of the individual expressed through personal information.”...

View Article



Image may be NSFW.
Clik here to view.

Is the Cloud Secure?

When talking about moving applications, data, and users to the cloud, security is always the first concern. IT leaders proposing a cloud computing strategy have to deal with two seemingly conflicting...

View Article

Image may be NSFW.
Clik here to view.

Case Sensitive for Sensitive Data

Who can guess the Password …

View Article

Image may be NSFW.
Clik here to view.

Do Those E-mail Scams Work on Anyone?

This is the same guy who wired money to that “friend” overseas who promised to pay him back double. Enjoy your Friday Funny. Click the image to enlarge, and copy the permalink to share with friends!

View Article

Image may be NSFW.
Clik here to view.

This Cartoon is Password Protected

You can’t fix what you can’t measure! Click the image to enlarge, and copy the permalink to share with friends.

View Article


Image may be NSFW.
Clik here to view.

At a Glance: America’s Top Security Concerns

Unisys has been conducting the bi-annual Unisys Security Index since 2007 to gauge consumer security perceptions around the world. In the United States, we interview more than 1,000 consumers every six...

View Article

Image may be NSFW.
Clik here to view.

Finally! A simple solution for mobile device security

After months of research, IT finally found a foolproof way to get employees to comply with security policy. Download the permalink to share with friends!

View Article

Image may be NSFW.
Clik here to view.

You Know the Cloud Has Gone Mainstream When …

View Article


Image may be NSFW.
Clik here to view.

Wireless Network Security: At Least His Heart’s in the Right Place

View Article


Security Straight Talk: Cracking the Code at The Security Intersection of...

Letter from the Editor 12-week Conversation on Securing a Borderless Enterprise: Join Us! A global team of Unisys Security experts and consultants invite you to this twelve-week long blog conversation...

View Article

The Six Biggest Hacking Threats and How to Deal with Them

There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...

View Article

Unisys in the World: Protected Identities and Remote Banking in Cartagena,...

Steve Vinsik was recently in Cartagena, Columbia, presenting protecting identities concept on secure remote banking at the 11th Strategic Congress on Technology and Financial Marketing Conference known...

View Article

Image may be NSFW.
Clik here to view.

What’s in a Name?

View Article


Caution Against Over-Regulation of the Borderless Cyber Enterprise

I recently spent some time with Gholam Sheibani. He is one Unisys’ key subject matter expert in Security. We had an interesting discussion around over-regulating in this new cybersecurity space across...

View Article

Image may be NSFW.
Clik here to view.

Password Assistance

View Article


Building Castles in the Sky: Mobile Hacking and Its Impact on CyberSecurity

Today we are featuring a special guest blogger, Tom Kellerman, Commissioner on The Commission on Cyber Security for the 44th Presidency of the United States of America. Just a few key questions, and we...

View Article

CISO Uncovers a Few Surprises and Shares Unisys Best Practices with European...

[Sowmya Murthy] Patti, where were you recently talking to clients, and what topic(s) were you discussing? [Patricia Titus] I recently traveled to Belgium and Holland for meetings with clients and...

View Article


Year in the Rear View Mirror: Part II

Last week I highlighted Jan Wiewiora and the “how’s” of Preventing Data Leaks Before They Occur. This week I want to bring your attention to one of our most recent additions, Richard Bryant.  He is a...

View Article

Image may be NSFW.
Clik here to view.

It’s All About Strong Authentication

In any industry, real-time access to information is critical. In the healthcare industry, lives hang in the balance. Financial services companies need to extend credit to the right people at the right...

View Article
Browsing latest articles
Browse All 19 View Live




Latest Images