DXC on Security

DXC’s security experts discuss security challenges and solutions in today’s changing landscapes

Lemons, silos and trust issues: How to turn GDPR into lemonade

lemon-juicer

If you attend any of the numerous seminars about GDPR (the EU’s General Data Protection Regulation) nowadays, you’ll notice that the new rules are taking quite some flak. Invariably, some CIOs or CEOs from companies big and small will lament the administrative burden yet another EU regulation puts on them. Give me the place to […]

How to avoid a ransomware attack

Computer Security

Ransomware is a major security threat, three companies alone in 2017 identified $700 million worth of damage from recent attacks, and the global damage is assessed to be exponentially higher. Businesses recognize the severity of the threat, and now need to develop strategies to minimize their risk. The first step is a thorough diagnosis of […]

2 new business processes key to GDPR compliance

With the rise of the European Union’s General Data Protection Regulation (GDPR), your customers’ personal data is about to gain a great deal of value. As that happens, your organization will need not only new technologies, but also new processes and behaviors. We’ve all become more active users of the internet and mobile channels. As […]

Your company has been hit with ransomware: What’s the best response?

Ramsonware

Organizations hit with ransomware must decide if the situation has become extreme enough to pay the ransom.  Although law enforcement adheres to a strict policy of not negotiating with the extortionists, nuances do exist. Companies need to understand the full spectrum of options, how interactions with the criminals may evolve and how to position the […]

Getting the analytics right for GDPR compliance – and beyond

The challenges of complying with the European Union’s new General Data Protection Regulation (GDPR) are clear: Every organization serving customers in the EU — including organizations outside the EU that offer goods or services to individuals within it — will need to comply with new data privacy rules by May 2018. The clock is ticking, […]

Accelerating GDPR readiness: Now’s the time to get started

Bot

Accelerating your readiness for the European Union’s General Data Protection Regulation (GDPR) is one of the most important activities your organization could undertake this year. By complying with GDPR, you can not only avoid the EU’s potentially huge fines for noncompliance, but also improve your data protection and management, understand your customers better, and protect […]

Internet worms through the ages — from relatively low risk to highly destructive

Security worm

In recent weeks, information security professionals have been sending out red alerts warning users of rapidly spreading, highly destructive worms. The security experts at DXC Technology are no exception. We are working with customers on a defense in-depth approach with perimeter security, using products with a secure-by-design approach (like recent chipsets from Intel & ARM) […]

Defensive strategies for protecting IoT

When it comes to the Internet of Things (IoT), there are already billions of the tiny connected devices and they’re creating game-changing opportunities for a variety of companies. But IoT’s promise could be derailed by its risks. Building a secure IoT future will require the efforts of all industry participants, from those that make IoT […]

Industry 4.0 and IoT pose new security challenges

Author’s note: The intelligence that forms this blog post belongs to Shaun Bligh-Wall, my brilliant colleague who in late June 2017 passed away from acute myeloid leukemia. For Shaun, the work of information security wasn’t just a job, it was a passion. He will be deeply missed and long remembered. While information security is always […]

A month after WannaCry: How do we stop the next threat?

Computer Security

It’s been almost a month since the WannaCry ransomware attacks crippled businesses and governments in more than 150 countries. Though the attack was short-lived with a “kill switch” quickly identified, the disruption sent a clear message: As bad actors become more powerful and bold in their attacks, organizations must step up their game to stay […]