Security

News, trends and insights for cybersecurity in the digital age

Security banner

Enabling a secure ecosystem of connected devices

The number of connected devices is predicted to grow to 75 billion by 2025. This will create a massively connected ecosystem, and data security will be paramount. Many of these devices will be cyber-physical systems, which closely integrate computation, networking and physical processes. The devices consist of a physical entity and its cyber twin, which […]

Moving toward a consistent framework for digital security transformation

password security CSC Blogs

By Curtis Price, IDC Organizations pursuing digital transformation initiatives are typically doing so to achieve a variety of possible business outcomes ranging from improved customer experience to improved operational efficiency. As enterprises plan their digital journeys, they are increasingly moving to a more distributed IT environment where corporate applications reside on premises as well as […]

Making analysts better using AIRO in security operations

improvement-concept

By Curtis Price, IDC The traditional security operations model is rapidly succumbing to the challenges and dynamics inherent in today’s cybersecurity market. Over the last few years, organizations have deployed a myriad of security technologies to combat specific threats, and as a result have inherited a collection of point product solutions with very little interoperability. […]

Automating and orchestrating “SecOps” and integrating service management

orchestra-conductor

By Curtis Price, IDC Managing an enterprise’s security posture and mitigating risk continues to be a top of mind concern for corporate executives. Enterprises are not only spending more on technologies to prevent attacks, but also establishing procedures for quickly and effectively responding to a breach. However, as organizations develop holistic security strategies that span […]

Avoiding cyber attacks while on the road to digital transformation

No matter where your organization may be on its digital transformation journey, beware the dangers lurking along the way. Fellow travelers down this road have been waylaid time and again by cybercriminals wreaking havoc through ransomware, distributed denial of service attacks, data breaches and other types of attacks. Digitizing more core business processes, after all, […]

Reducing risk in digital transformation

Digital transformation and enterprise risk management can be thought of as parallel highways. That’s because any transformation effort will introduce new risks and change to the organization’s overall security posture. As organizations continue their digital transformations, the transformation of security and risk management must be an integral part of that journey. Organizations must integrate security […]

Cyber reference architecture: A security backbone for the enterprise

At the heart of digital transformation is data. The importance of protecting this critical business asset is bringing cyber security into sharp focus in the boardroom as well as the data center. In the past, an enterprise’s cyber security team focused on IT security risks and threats, with little reference to business risks, objectives and […]

Three ways to build a rapid-response culture in cybersecurity teams

cybersecurity-response

The phrase “need for speed” might sound like a catchy one-liner from a Hollywood blockbuster. However, when it comes to information security, they are words to live by. Consider this vital fact: Malware permeates organizations with lightning speed and frequently causes millions of dollars of damage in a relatively short period of time. Because of this, cybersecurity […]

NIST updates cybersecurity framework

cyllindrical-framework

It’s been a long time coming. The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) recently released version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity, or affectionatey called the Cybersecurity Framework. The initial framework was created to help organizations that operate critical infrastructure better secure their digital assets. These industries include energy, […]

Five reasons why every organization should conduct regular cybersecurity self-assessments

This blog was originally posted by Concerto Cloud Services. Since then, Concerto Cloud Services has become DXC Concerto, the mid-market cloud offering within DXC Technology. The past year was filled with news about cybersecurity, including phishing scams, ransomware and new attack methods. And this year, security experts again predict even bigger attacks and smarter hacks […]