Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Penetration Testing vs. Vulnerability Assessment
You are here: Home \ Blog
Pentest vs VA
Posted on Tuesday, September 18th, 2018 by
Companies and people are often misinformed or misguided as to what the differences are between a penetration test and a vulnerability assessment. In many cases, there are upper-level executives which ask for a penetration test but really want a vulnerability assessment, and vice-versa. In these scenarios, the assessment is sometimes improperly labeled which can be very misleading.

Topics: Penetration Testing, Vulnerability Assessment

choose right pentesting vendor
Posted on Tuesday, September 11th, 2018 by
How do you choose the right penetration testing company? What do you need to consider before engaging an external provider? And how can you trust this provider to perform the penetration testing engagement to your satisfaction and in accordance with your business needs?

Topics: Penetration Testing

Posted on Tuesday, September 4th, 2018 by
Did an 11 year old hack a state election website? Are voting machines easy prey for hackers? And does any of this matter to IT professionals charged with securing corporate networks from cyber attacks? The answers to the above questions are: no, yes and YES!

Topics: Penetration Testing

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Incident Response FAQ
Posted on Tuesday, August 28th, 2018 by
We’ve answered to the most frequently asked questions to help organizations develop an effective incident response strategy that reflects best practices, is aligned with their overall cybersecurity strategy and helps them deal with security incidents effectively.

Topics: Incident Response

Puzzle head what to know before conducting a pentest
Posted on Tuesday, August 21st, 2018 by
A penetration test, or pentest, is a process where a benign ethical hacker conducts scans, probes and attacks on a network or application to uncover vulnerabilities. In many ways it's like going to the doctor. You need a checkup, we all do. The frequency of the checkup will vary from person to person depending on health, age, medical history and much more. A pentest can be very similar in the sense that there is a third-party team of hackers or individual hacker performing an assessment on your network or application in order to determine its current security posture.

Topics: Penetration Testing

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity Crossword Puzzle
Posted on Tuesday, August 7th, 2018 by
Our first crossword puzzle has been a success! Due to popular demand, we created another one and increased the difficulty. Good luck!

Topics: Tips & Tricks

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

Stay up to date! Subscribe to our Blog

Topics

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?

More