DXC on Security

DXC’s security experts discuss security challenges and solutions in today’s changing landscapes

Internet worms through the ages — from relatively low risk to highly destructive

Security worm

In recent weeks, information security professionals have been sending out red alerts warning users of rapidly spreading, highly destructive worms. The security experts at DXC Technology are no exception. We are working with customers on a defense in-depth approach with perimeter security, using products with a secure-by-design approach (like recent chipsets from Intel & ARM) […]

Defensive strategies for protecting IoT

When it comes to the Internet of Things (IoT), there are already billions of the tiny connected devices and they’re creating game-changing opportunities for a variety of companies. But IoT’s promise could be derailed by its risks. Building a secure IoT future will require the efforts of all industry participants, from those that make IoT […]

Industry 4.0 and IoT pose new security challenges

Author’s note: The intelligence that forms this blog post belongs to Shaun Bligh-Wall, my brilliant colleague who in late June 2017 passed away from acute myeloid leukemia. For Shaun, the work of information security wasn’t just a job, it was a passion. He will be deeply missed and long remembered. While information security is always […]

A month after WannaCry: How do we stop the next threat?

Computer Security

It’s been almost a month since the WannaCry ransomware attacks crippled businesses and governments in more than 150 countries. Though the attack was short-lived with a “kill switch” quickly identified, the disruption sent a clear message: As bad actors become more powerful and bold in their attacks, organizations must step up their game to stay […]

Protect your business by orchestrating and automating security operations

Organizations today face an unprecedented number of security threats, and the risks will only increase as employees, customers and partners embrace new trends and innovations on their road to digital transformation. These changing and growing threats mean that traditional security methods – techniques that defend the enterprise with moats and walls and monitor for things […]

What you need to know about IoT hacking and medical devices

Some pretty frightening news has come out of the healthcare industry in recent months related to cyberattacks and medical devices. A legal case is now underway questioning the safety of cardiac implants used by a large U.S. hospital. A lawsuit claims the devices are vulnerable to potentially life-threatening cyberattacks. The OneTouch Ping insulin pump has […]

One key step to protecting at-risk enterprise applications

StrikeForce penetration testing CSC Blogs

Cybercrime is growing, and the perpetrators are becoming more sophisticated. Worse, they’re getting really good at networking – sharing techniques, code and successes that can multiply the effects of an attack exponentially. Just last month, the huge Mirai attack launched a bot army of IoT devices on critical Internet infrastructure that supports big-name websites such […]

Australia’s Cyber Security Strategy and Action Plan awakens nation to modern-day threat

Retail data regulation CSC Blogs

On 21 April 2016, Prime Minister Malcolm Turnbull officially launched the Federal government’s national cybersecurity strategy. This initiative provides the pivotal step needed for the greater protection of the nation from cybersecurity attacks that have demonstrated the potential to endanger national security. This strategy will be instrumental in providing explicit guidance to a wide range […]

Cyber insurance: State of play

Cybersecurity insurance CSC Blogs

Cyber risks are real and constantly evolving with technological advances and pervasiveness. Whether as individuals, small businesses or multinational companies, we all face the threat of a cyber incident that can result in costly financial consequences. As the insurance industry deals with heavy competition for classic products and negative interest rate headwinds limiting returns from insurer’s bond portfolios, cyber risks […]

Cybersecurity and the future of retail

As the retail industry undergoes a huge transformation, bringing new and innovative digital ideas to life, threat agents — cyber criminals and hacktivists — gain more ways to steal personal data (PII) and payment card information (PCI) or harm retail organizations and their customers. Likewise, corporations (competitors) or nation states may commit business interruptive cyber activities with economic or […]