DXC Labs | Security
DXC Labs delivers thought leadership and technology prototypes to enable enterprises to thrive in the midst of digital transformation.
DXC Labs | Security brings together our team of world-class advisors to develop strategic and architectural insights to reduce digital risk.
DXC’s Cyber Reference Architecture is at the heart of our research, providing clients with detailed guidance on methods to efficiently resolve the most challenging security problems. We help clients minimize risk while taking maximum advantage of the digital commons.
DXC's security organization has spent decades monitoring millions of threats globally, responding to the world’s largest attacks. DXC provide manage security services for the world’s largest organizations and have implemented thousands of security solutions. Explore DXC Security Labs insights:
Subscribe to DXC Threat Intelligence and DXC Labs | Security
Each month, DXC’s intelligence organization provides a strategically oriented report of major incidents and key threat developments. Subscribe to the DXC Threat Intelligence Report and the latest insights from DXC Labs | Security,
Adversary emulation: Measure your ability to detect attackers in the shadows
Vulnerability management, penetration testing and red teaming are key exercises, but it’s critical to consider adversary emulation at both technical and behavioral levels to ensure highly effective post-compromise resilience. Read more
Cyber extortion becomes intimate
In the near future there will be a much more prominent flow of blackmail coursing through the arteries of the criminal body. Attackers will steal documents, browsing histories, mail repositories, photos and videos, as well as activate the microphone and camera to capture intimate activities of their victim. Read more
Secure digital transformation: Principles for Enterprise Defense
Enterprise leaders recognize security as an enable of digital services crucial to business growth. However, given the complexity of security architectures, they often struggle to understand what it is they need to do in order to enable their secure digital transformation. This white paper provides a set of succinct and simplified high-level architectural principles designed for executive consumption. Read more
Designing SOCs beyond the knowable future
What would a Security Operations Center (SOC) look like in 2030? And how could we architect one today? We know today that most enterprises are undergoing digital transformation, and it’s leading to a fundamental redesign of services, products and business value. As digital transformation drives business change, client expectations will also continue to change and affect the forecast for 2030. Read more
DevSecOps: A comprehensive approach to secure applications
As organizations move to the cloud and digital applications, the risk of security breaches presents a real danger of disruption and destruction of business value. Security must be baked in to the application development process. Explore the expanding role of DevSecOps and key capabilities and concepts that can help an organization ensure security is a natural outcome of the development process, not an afterthought. Read more
Is Windows 10 security enterprise ready?
Are the security capabilities in the enterprise version of Microsoft’s Windows 10 operating system robust enough to rely on as a secure endpoint solution? To answer that question you have to understand the benefits and compromises required to implement Windows 10 in a real-world environment. This paper examines the security capabilities in the latest revision of what Microsoft calls its “most secure version of Windows” to date. Read more
Top 10 security trends for 2019
Each year, DXC Technology’s security advisors, technologists and partners analyze emerging trends to help organizations plan and set priorities. In 2019, enterprises must guard against many threats including targeted ransomware attacks, hardware vulnerabilities, increased international tension, and the growing practice of extortion. Read more
Lessons from the nuclear age for operational technology and enterprise security
Warfare is once again being revolutionized: Threats are now physical and digital. Cyber weapons are being used against IT and operational technology (OT) to threaten critical infrastructure.
Nuclear weapons instigated major evolutions of warfare. Military theorists today wonder whether we can draw lessons from nuclear conflict strategies to help keep our critical national infrastructure — and our enterprises — safe from cyber attacks on OT. Read more
How to create a culture of cyber resiliency
As organizations rely more heavily on technology such as cloud, attackers are becoming more sophisticated, more resourceful and better organized. The goal is not to prevent attacks, but to be able to survive them and maintain operations — to become cyber resilient. Cyber resiliency should be part of a holistic approach to security that takes all aspects of the business into consideration, from employees and partners to the board of directors. Read more
Rethink risk and enterprise security in a digital world
Digital transformation promises to deliver new business value but also introduces new security risks that demand equally new and innovative responses. Organizations on a digital transformation journey must make a parallel trip, one that integrates security and risk management into DevOps and Continuous Delivery (CD) processes. As organizations continue their digital transformations, the transformation of security and risk management must be an integral part of that journey. Read more
10 steps to securing the internet of things
IoT presents a heightened security challenge. Security organizations must protect significantly more endpoints across the enterprise, and an IoT security breach could lead to immediate damage to IT and physical systems. IoT underscores the need for today’s enterprises to focus on cyber resilience — the ability to keep transforming efficiently and effectively in the face of increased threats from nation-states, criminals, competitors and insiders. Read more
Ransomware: To pay or not to pay
Ransomware is serious, damaging business. It is also like a game of chess: Enterprises must plan their strategy and make the best moves. Because there is no “right” answer, this paper outlines steps enterprises can take and what trade-offs they should assess when deciding whether or not to pay a ransomware demand. FInd out how to understand the full spectrum of options, how interactions with extortionists may evolve and how to position your enterprise to withstand such attacks. Read more
Putting on the right SOC to fit your security operations
Security operations centers (SOCs) bring together the resources needed to direct the defense of digital and even physical assets. As organizations embrace the latest digital technologies, SOCs are critical to enabling key business initiatives. With cyber threats evolving and intensifying in scope and impact, organizations of all sizes are facing major decisions about how to cost-effectively manage security operations. Learn more in this paper. Read more
Thriving safely in the age of digital identity management
Organizations engaged in digital transformation need a new approach to thrive in this new world. The bedrock principle for security is no longer about the “where.” It’s about the “who.”
Success requires a focus on digital identity management. Identity and access management (IAM) can effectively establish a logical perimeter that enables digital transformation. Read more
How to overcome the security questions facing blockchain
While blockchain is best known as the foundation for cryptocurrencies such as bitcoin and Ethereum, many think the technology will emerge as the bedrock of a peer-to-peer economy, transforming industries in the process — that is, if the security of blockchain ecosystems can be ensured. Overcoming the security questions discussed will help ensure the continued evolution of blockchain in the financial services industry and help it mature into a disruptor in others. Read more
Learn more about how DXC Labs is supporting innovation with drones, 3D modeling, virtual and augmented reality, machine learning, brain wave monitoring and more.
Contact us to learn more about DXC in Security.