Technology

Half of cyberattacks today stem from compromised credentials: DXC – Security

0
Please log in or register to do it.
Half of cyberattacks today stem from compromised credentials: DXC – Security



The APAC cybersecurity landscape continues to be dogged by threats, and malicious actors are thriving.

The region is experiencing rising cyberattacks with attackers continuing to exploit vulnerabilities, while defenders scramble to plug each entry.

Unfortunately, this is tilting the advantage towards the malicious actors, DXC Technology’s Kylie Watson told iTnews Asia in an exclusive interview.

Watson was recently appointed as DXC’s head of security for Asia Pacific (APAC), Middle East and Africa (MEA), adding to her current role in Australia and New Zealand.

The major concern in cybersecurity is to identify the origins of threats.

“A substantial number of these threats stem from compromised credentials, accounting for nearly half of all cyber attacks,” said Watson.

Moreover, APAC organisations also face the challenge of managing legacy systems, which are vulnerable to compromise.

According to Watson, migrating infrastructure to the cloud is a good option but expensive.

“This dilemma forces decision-makers to weigh the investment in ageing infrastructure against the expense of transitioning to cloud-based platforms, especially in the context of prevailing economic constraints,” she said.

Human oversight remains key

To counter cyberattacks, the need is to enhance awareness and emphasise the urgency of mitigation efforts.

For example, to mitigate the cyberattacks, DXC has established security operating centres in locations including Malaysia, China, India and Australia to strengthen regional defence mechanisms.

According to Watson, these centres enable data collection, log analysis, and device management to mitigate threats.

The organisation leverages technologies including automation and employing XDR (extended detection and response) and MDR (managed detection and response) platforms, Watson said.

However, human oversight remains integral to the approach, providing an essential layer of insight and validation in the threat detection process, she added.

Adhering to legislation and regulations is also important in cybersecurity, despite the complexity and variability of laws across different regions.

However, achieving higher levels of security can sometimes disrupt business operations, prompting discussions about risk tolerance and the need for adjustments, said Watson.

“While it may not be feasible to secure everything simultaneously, organisations must prioritise efforts and maintain compliance with legislative requirements,” she added.

Organisations looking at security holistically

According to Watson, the company engages the latest technologies including cyber automation and AI, which enable real-time threat intelligence collection and monitoring to help organisations strengthen cyber security defence.

“This allows us to apply our insights from the vast number of trends, lessons learned, and patterns used on the thousands of customers we work with every day, 24/7,” she said.

Watson highlighted a project that involved a national airport to establish a state-of-the-art operation centre and monitoring platforms from scratch, leveraging cloud technology and implementing round-the-clock surveillance.

“Although the airport is yet to go live, meticulous planning and scenario testing have instilled confidence in the project’s success,” Watson said.

Last year, the upcoming Western Sydney International Airport selected DXC Technology as the master systems integrator.

The facility is set to open in 2026.

DXC is responsible for building foundational technology platforms for operations, delivering integration services, cybersecurity and hosting platforms to bring together 60 operational systems.

In addition, DXC has enhanced security measures within the car manufacturing sector, particularly in Japan and China.

For example, Japan’s Nissan Motor Corporation selected DXC to transition to a cloud-based IVR (interactive voice response) service, enabling remote access and facilitating help desk agents to work from home.

It helps in device management and maintenance and deploys monitoring tools to help Nissan identify and rectify potential PC issues.

Watson said, “Our DXC Cyber teams across Asia Pacific, Middle East and Africa have access to collected information that they can share back with customers from their own lived experience and through our Cyber Security Centre for Excellence, which is an investment at DXC, to fortify the region and improve the cyber posture of our customers.”

Moreover, Kylie mentioned that the team members interconnect regularly with customers and industry stakeholders to share briefings, thought leadership, conferences and threat intelligence. 



Source link

Diving in the Philippines: don’t forget Puerto Galera – the diversity of fish and other marine life is breathtaking
Yoma Soars 30% in a Week on 79% Revenue Growth and Profit Comeback