DXC on Security

DXC’s security experts discuss security challenges and solutions in today’s changing landscapes

The carrot and the stick approach to cyber resilience


The world of cyber security is maturing at a rapid pace. Commercial and public sector organisations are increasingly focusing on cyber resilience, as they realise that the impact of the inevitable must be managed.  They cannot simply focus on prevention, but also on the cure and the recovery. Efforts for greater cyber resilience are against […]

InFraud aftermath: Is your cybersecurity team big enough?

rugby team

On the 7th February, the U.S. Department of Justice announced the indictment of 36 suspects involved in an online transnational cybercrime organisation referred to as the Infraud Organization. The DOJ claimed the group was responsible for more than $530 million in losses. The suspects worked from a number of countries, including the United States, UK, […]

Why security matters: Lessons from Data Privacy Day 2018

Unless data privacy is your lifeblood, you’ve probably never heard of Data Privacy Day.  It’s not publicized nearly enough (in my opinion), and to be truly vigilant about data privacy and security, it will surely take more than one day out of the year to learn about it.  However, I am thankful for the one […]

10 security predictions for 2018

Cyber security isn’t getting any easier. Criminals are getting more sophisticated. Damages are growing more serious. And attacks are becoming more common. Yet far too many IT and cyber security leaders remain in reactive mode. That’s a serious mistake, because now is the time to be proactive. These incidents will happen, so every organization now […]

Enterprise security lessons for Meltdown and Spectre defence


Media panic was at a fever pitch last week with news of the Meltdown and Spectre cyber security flaws.  This is another high profile cyber security event that enterprise organisations will have to manage over the next several months. This is not, however, a repeat of the Wannacry and Not Petya incidents we saw during […]

The Twelve Days of Security


The holiday season is upon us. And this time of year, it’s easy to get caught up in the rush of finishing work in order to make time for family and friends. Sometimes though, it’s best to take a moment to look back on the year and celebrate our successes and then prepare for cyber […]

4 tips for better threat hunting against cyber attacks


Threat hunting has gotten a lot of publicity lately, but even with all the coverage in the security trade press it’s still largely misunderstood. Threat hunting is not about identifying random zero-day attacks. At its best, threat hunting uses software tools, network data, a solid methodology and automated metrics to ferret out information on targeted […]

5 tips to better detect and respond to advanced endpoint threats


Endpoint threats are growing more sophisticated and targeted, as hackers come up with new attack techniques and tailor hacking tactics to their specific targets. Recently, ransomware attacks such as WannaCry and Petya compromised hundreds of thousands of end-user devices, leaving IT departments scrambling to resolve the outbreaks without good visibility or control of their endpoints. […]

Why a managed cloud access security broker could make sense for your company


Companies move to the cloud to save money on infrastructure and improve time-to-market on application development. However, once they start using cloud applications, organizations using traditional security monitoring solutions often lose control and visibility of their infrastructure and applications. End users now have access to multiple cloud-based collaboration and file sharing applications, tools that may […]

Lemons, silos and trust issues: How to turn GDPR into lemonade


If you attend any of the numerous seminars about GDPR (the EU’s General Data Protection Regulation) nowadays, you’ll notice that the new rules are taking quite some flak. Invariably, some CIOs or CEOs from companies big and small will lament the administrative burden yet another EU regulation puts on them. Give me the place to […]