Story image

The 'wargames' are on: Unisys launches threat simulation services

31 Jan 2017

Unisys has launched a new set of cyber resilience services that use real-world threat simulation to help clients plan for cyberattack crises. The new services use threat simulation to develop avoidance and response policies and procedures.

“The stakes are extremely high for executives responsible for averting any crisis that can result in brand damage, market devaluation or loss of customers,” says Tom Patterson, chief trust officer at Unisys.

The company developed the new services based on US Department of Defense cyber wargaming methodology and US-based standards for security, but designed them specifically for enterprises and governments.

These techniques allow Unisys technology to identify the most likely, most dangerous and out-of-the-box challenges for clients. It also assesses the level of preparation clients put into managing crisis events, as well as how complete its incidence response plan is.

The technology also allows clients to organise teams, which can achieve event objectives while responding to operational and environmental condition changes.

The end result is a detailed blueprint of exercise analysis and recommendations, the company says.

At the head of the resilience services is Unisys global director John Bone, who says the wargaming tactic is differentiated by people, programmes and partners, therefore it offers immediate results.

“Working at the client’s comfort level, we collaborate to understand their challenges; build wargame scenarios that align with their real-world threats; and lead, monitor and analyse exercises based on those scenarios. Then we provide honest, actionable feedback to help them improve,” Bone concludes.

Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."