DXC on Security

DXC’s security experts discuss security challenges and solutions in today’s changing landscapes

Enterprise security lessons for Meltdown and Spectre defence

computer-chip

Media panic was at a fever pitch last week with news of the Meltdown and Spectre cyber security flaws.  This is another high profile cyber security event that enterprise organisations will have to manage over the next several months. This is not, however, a repeat of the Wannacry and Not Petya incidents we saw during […]

The Twelve Days of Security

snow-covered-trees

The holiday season is upon us. And this time of year, it’s easy to get caught up in the rush of finishing work in order to make time for family and friends. Sometimes though, it’s best to take a moment to look back on the year and celebrate our successes and then prepare for cyber […]

4 tips for better threat hunting against cyber attacks

target

Threat hunting has gotten a lot of publicity lately, but even with all the coverage in the security trade press it’s still largely misunderstood. Threat hunting is not about identifying random zero-day attacks. At its best, threat hunting uses software tools, network data, a solid methodology and automated metrics to ferret out information on targeted […]

5 tips to better detect and respond to advanced endpoint threats

intruder

Endpoint threats are growing more sophisticated and targeted, as hackers come up with new attack techniques and tailor hacking tactics to their specific targets. Recently, ransomware attacks such as WannaCry and Petya compromised hundreds of thousands of end-user devices, leaving IT departments scrambling to resolve the outbreaks without good visibility or control of their endpoints. […]

Why a managed cloud access security broker could make sense for your company

Castle-in-the-Clouds

Companies move to the cloud to save money on infrastructure and improve time-to-market on application development. However, once they start using cloud applications, organizations using traditional security monitoring solutions often lose control and visibility of their infrastructure and applications. End users now have access to multiple cloud-based collaboration and file sharing applications, tools that may […]

Lemons, silos and trust issues: How to turn GDPR into lemonade

lemon-juicer

If you attend any of the numerous seminars about GDPR (the EU’s General Data Protection Regulation) nowadays, you’ll notice that the new rules are taking quite some flak. Invariably, some CIOs or CEOs from companies big and small will lament the administrative burden yet another EU regulation puts on them. Give me the place to […]

How to avoid a ransomware attack

Computer Security

Ransomware is a major security threat, three companies alone in 2017 identified $700 million worth of damage from recent attacks, and the global damage is assessed to be exponentially higher. Businesses recognize the severity of the threat, and now need to develop strategies to minimize their risk. The first step is a thorough diagnosis of […]

2 new business processes key to GDPR compliance

With the rise of the European Union’s General Data Protection Regulation (GDPR), your customers’ personal data is about to gain a great deal of value. As that happens, your organization will need not only new technologies, but also new processes and behaviors. We’ve all become more active users of the internet and mobile channels. As […]

Your company has been hit with ransomware: What’s the best response?

Ramsonware

Organizations hit with ransomware must decide if the situation has become extreme enough to pay the ransom.  Although law enforcement adheres to a strict policy of not negotiating with the extortionists, nuances do exist. Companies need to understand the full spectrum of options, how interactions with the criminals may evolve and how to position the […]

Getting the analytics right for GDPR compliance – and beyond

The challenges of complying with the European Union’s new General Data Protection Regulation (GDPR) are clear: Every organization serving customers in the EU — including organizations outside the EU that offer goods or services to individuals within it — will need to comply with new data privacy rules by May 2018. The clock is ticking, […]