DXC on Security

DXC’s security experts discuss security challenges and solutions in today’s changing landscapes

5 tips to better detect and respond to advanced endpoint threats

intruder

Endpoint threats are growing more sophisticated and targeted, as hackers come up with new attack techniques and tailor hacking tactics to their specific targets. Recently, ransomware attacks such as WannaCry and Petya compromised hundreds of thousands of end-user devices, leaving IT departments scrambling to resolve the outbreaks without good visibility or control of their endpoints. […]

Why a managed cloud access security broker could make sense for your company

Castle-in-the-Clouds

Companies move to the cloud to save money on infrastructure and improve time-to-market on application development. However, once they start using cloud applications, organizations using traditional security monitoring solutions often lose control and visibility of their infrastructure and applications. End users now have access to multiple cloud-based collaboration and file sharing applications, tools that may […]

Lemons, silos and trust issues: How to turn GDPR into lemonade

lemon-juicer

If you attend any of the numerous seminars about GDPR (the EU’s General Data Protection Regulation) nowadays, you’ll notice that the new rules are taking quite some flak. Invariably, some CIOs or CEOs from companies big and small will lament the administrative burden yet another EU regulation puts on them. Give me the place to […]

How to avoid a ransomware attack

Computer Security

Ransomware is a major security threat, three companies alone in 2017 identified $700 million worth of damage from recent attacks, and the global damage is assessed to be exponentially higher. Businesses recognize the severity of the threat, and now need to develop strategies to minimize their risk. The first step is a thorough diagnosis of […]

2 new business processes key to GDPR compliance

With the rise of the European Union’s General Data Protection Regulation (GDPR), your customers’ personal data is about to gain a great deal of value. As that happens, your organization will need not only new technologies, but also new processes and behaviors. We’ve all become more active users of the internet and mobile channels. As […]

Your company has been hit with ransomware: What’s the best response?

Ramsonware

Organizations hit with ransomware must decide if the situation has become extreme enough to pay the ransom.  Although law enforcement adheres to a strict policy of not negotiating with the extortionists, nuances do exist. Companies need to understand the full spectrum of options, how interactions with the criminals may evolve and how to position the […]

Getting the analytics right for GDPR compliance – and beyond

The challenges of complying with the European Union’s new General Data Protection Regulation (GDPR) are clear: Every organization serving customers in the EU — including organizations outside the EU that offer goods or services to individuals within it — will need to comply with new data privacy rules by May 2018. The clock is ticking, […]

Accelerating GDPR readiness: Now’s the time to get started

Bot

Accelerating your readiness for the European Union’s General Data Protection Regulation (GDPR) is one of the most important activities your organization could undertake this year. By complying with GDPR, you can not only avoid the EU’s potentially huge fines for noncompliance, but also improve your data protection and management, understand your customers better, and protect […]

Internet worms through the ages — from relatively low risk to highly destructive

Security worm

In recent weeks, information security professionals have been sending out red alerts warning users of rapidly spreading, highly destructive worms. The security experts at DXC Technology are no exception. We are working with customers on a defense in-depth approach with perimeter security, using products with a secure-by-design approach (like recent chipsets from Intel & ARM) […]

Defensive strategies for protecting IoT

When it comes to the Internet of Things (IoT), there are already billions of the tiny connected devices and they’re creating game-changing opportunities for a variety of companies. But IoT’s promise could be derailed by its risks. Building a secure IoT future will require the efforts of all industry participants, from those that make IoT […]