2018: Businesses get stronger through cyber resilience

In the past, companies tried to create perfect security. You were either secure, or you weren’t. But today, risk is no longer viewed as being perfect or binary. It’s a continuum. In 2018 enterprises will focus on getting their resilience as high as possible — or, reducing their risk by taking down the highest-risk activities. […]

What’s your cyber risk appetite?

How much cyber risk is your organization willing to take on? Knowing this “risk appetite” is an important element in the pace of the digitization of your organization. Cyber resilience is the ability of your enterprise to keep its transformed business models efficient and effective in the face of increased IT system threats from nation […]

6 technology trends for 2018: Guideposts for digital transformation

‘Tis always the season for continuous innovation. As we look ahead to 2018, we see six big trends feeding the next wave of disruption and productivity. And that means opportunity for the digital enterprise. 1. Re-platforming the enterprise In 2018, companies will move to common IT platforms so they can respond to market changes faster […]

Internet worms through the ages — from relatively low risk to highly destructive

Security worm

In recent weeks, information security professionals have been sending out red alerts warning users of rapidly spreading, highly destructive worms. The security experts at DXC Technology are no exception. We are working with customers on a defense in-depth approach with perimeter security, using products with a secure-by-design approach (like recent chipsets from Intel & ARM) […]

What we now know about “PetrWrap”

Cybersecurity

Dubbed PetrWrap, yet another wave of ransomware hammered organizations in Europe and the United States yesterday. And just as was the case with the WannaCry ransomware, or any ransomware attack for that matter, this widespread PetrWrap ransomware attack finds systems encrypted shortly after infection and the attackers demanding a ransom to be paid. Also just […]

CEO fraud: With billions lost, is your organization at risk?

CEO Fraud social engineering CSC BlogsCEO Fraud social engineering cybersecurity CSC Blogs

Social engineering is one of the most popular and oldest scam techniques that actually works. As we have already moved on to the cyber age, where our financial records, research and development data, social life or medical history exist online, it is really crucial that this kind of information does not fall prey to fraudsters. However, it […]

Social engineering: Hacking the human mind

Social engineering is a method to manipulate people into doing something, such as divulging confidential information. It could be seen as the hacking of the human mind. Compared to, for example, software, the human mind has far more vulnerabilities that are significantly simpler to find and exploit since they do not require any special expertise like code or computer language. […]

Keeping up in an ever-extending vendor universe

Data analytics return on investment CSC Blogs

As companies evolve and their exponentially expanding requirements need to be satisfied, third parties and vendors come more and more into play. The reasons for this are justified. As more companies become reliant on Information Technologies and Professional Services, they need to procure the best products, which requires, in some instances, deep knowledge of certain […]

Security as a Service: Do you get the service you expected?

Security as a Service CSC Blogs

Following this article about why organizations should outsource security services, in this post I offer some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot of considerations and arrangements. While this post is not comprehensive, it offers important action items to consider when searching for a new security service provider. […]

Security as a Service: How to get the service you expect

Security provider contract tips CSC Blogs

This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are, even when all necessary steps were taken to ensure a successful project/service. Reasons for External Security Service Provider Let’s […]