Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

3 Key Considerations Before Outsourcing Your Security to an MSSP
You are here: Home \ Blog
consideration before outsourcing security mssp
Posted on Tuesday, July 17th, 2018 by
Truth be told, every organization is unique in terms of its cybersecurity needs. Engaging with an MSSP can have tremendous advantages for certain businesses and may not be required for others. Let’s look at 3 key considerations that you should be addressed as part of your decision making: 1. Overall security requirements, 2. Security expertise, 3. Threat monitoring & incident response.

Topics: Managed Security Services, MSS

Posted on Tuesday, July 10th, 2018 by
To find out how mature you are in terms of cybersecurity, you have to undertake 6 simple steps to define your security posture.

Topics: Cybersecurity Posture, Security Practices

what's your score
Posted on Tuesday, July 3rd, 2018 by
Test your cybersecurity knowledge. Fill out this crossword puzzle and try to beat our record. Play now!

Topics: Privacy & Security, Tips & Tricks

Posted on Tuesday, June 26th, 2018 by
To define your cybersecurity budget, ask yourself what you are trying to protect, why you are trying to protect it and what your current cybersecurity posture is. Answering these questions will help you determine which security expenses you absolutely require.

Topics: Cybersecurity Posture, Security Practices

where-do-i-start
Posted on Tuesday, June 19th, 2018 by
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes.

Topics: Controls, Cybersecurity Posture, Risk management, Security Practices, Threat Risk Assessments

what is a cybersecurity posture assessment
Posted on Tuesday, June 12th, 2018 by
When it comes to choosing the right cybersecurity strategy, how are organizations supposed to know what is best? Should you conduct regular penetration testing, vulnerability assessments, control assessments, compliance audits, risk assessments, security program reviews, etc.? The list goes on! How often should this be done? And how can you be sure that these initiatives will actually pay off?

Topics: Cybersecurity Posture, Security Practices

GDPR Privacy by Design
Posted on Tuesday, June 5th, 2018 by
The GDPR imposes Privacy by Design and privacy as the default setting to all controllers. This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing.

Topics: Compliance, Privacy & Security

Balls of different sports
Posted on Tuesday, May 29th, 2018 by
Knowing how to run a vulnerability scan and getting a list of vulnerabilities doesn’t make you a security specialist. You may think you know what a security assessment is, but the reality is that you might not.

Topics: Security Practices, Vulnerability Assessment, Vulnerability Management

Risk ahead sign
Posted on Thursday, May 24th, 2018 by
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks.

Topics: Controls, Risk management, Security Practices

GDPR Canada
Posted on Friday, May 18th, 2018 by
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis.

Topics: Compliance, Privacy & Security

Stay up to date! Subscribe to our Blog

Topics

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?

More