Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Mitigate Cybersecurity Incidents with the 20 CIS Critical Security Controls
You are here: Home \ Blog
20 cis controls
Posted on Monday, February 12th, 2018 by
Issued by the Center for Internet Security (CIS), the so-called Critical Security Controls for Effective Cyber Defense present 20 effective actions an organization can take to reduce its risk, strengthen its security posture and lower operational costs. A security control is a safeguard or countermeasure to avoid, detect, counteract or minimize “security” risks to a company’s assets. If you'd like to learn more, here is an overview of the 20 CIS Controls.

Topics: ArkAngel, CISO, Controls

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: ArkAngel, Control Assessment, Controls, Managed Security Services, Uncategorized

atm machine
Posted on Monday, January 29th, 2018 by
One way to prevent ATM fraud is to monitor the ATM network directly and on a 24/7 basis. The objective of ATM Monitoring is to stop client data theft by preventing malicious individuals from infiltrating the system directly through ATMs or by using malware that infects the organization from inside to eventually reach ATMs.

Topics: ArkAngel, Managed Security Services

Vulnerability Management - Hitachi Systems Security
Posted on Friday, January 26th, 2018 by
What is Vulnerability Management? Vulnerability management is the process of identifying, analyzing, fixing, and reporting on security vulnerabilities in systems and the software that runs them. Once vulnerabilities are found, they must be prioritized based on which ones pose the most dangerous threat to the organization.

Topics: ArkAngel, Managed Security Services, Risk management

Cloud Security
Posted on Wednesday, January 24th, 2018 by
Monitoring Office 365 logs offers a variety of benefits for organizations, including increased security maturity or enhanced detection capabilities, which are traditionally part of Data Loss Prevention (DLP) solutions. By monitoring and analyzing Office 365 security logs in a structured way...

Topics: ArkAngel, Cloud Security, Office 365

Cybersecurity Talent Shortage
Posted on Tuesday, January 2nd, 2018 by
We currently experience a shortage between 1 million and 1.8 million qualified people in the physical and cyber security industry. Today’s CISOs struggle between choosing to build their own IT security dream teams or outsourcing their security to a trusted security service provider. Now the question is, if we put 1 million people in a college and train them for 4-5 years every year for 20 years, would there be such a talent shortage? Did we miss the window to get that done?

Topics: CISO, Penetration Testing, Risk management

ATM
Posted on Wednesday, December 27th, 2017 by
Securing ATMs and other payment channels is no longer a choice but a necessity to avoid serious financial and reputational damage.

Topics: Managed Security Services, MSS, SIEM

GDPR - FAQ
Posted on Tuesday, December 19th, 2017 by
The GDPR will come into effect on May 25th, 2018 and raises numerous questions among organizations that handle data in Europe. We gathered the questions and answers collected from our webinar "GDPR - Focusing on the 4 Key Steps to Compliance": 1. Are Organizations Ready for GDPR Compliance? 2. Backup and Right to Be Forgotten 3. GDPR Challenges 4. Cloud Partners and GDPR Compliance 5. GDPR Penalties 6. GDPR 72 Hour Breach Notification 7. Data Portability

Topics: Compliance, Security Practices

Insider threat
Posted on Monday, December 18th, 2017 by
  How to Monitor, Detect, and Respond to Malicious Insiders   Insider threats have long been a source of security risk for businesses and organizations. Dating back to ancient times, militaries and nations routinely have used spies and espionage to gather intelligence on rivals. In today’s information age, malicious insiders regularly steal valuable data for...

Topics: Managed Security Services, Security Practices, Tips & Tricks

Why Organizations Aren't Using Cybersecurity Frameworks
Posted on Thursday, December 14th, 2017 by
Why implementing a cybersecurity framework is important? How to use CIS top 20 controls to monitor your risk?

Topics: Control Assessment, Managed Security Services, Risk management

Stay up to date! Subscribe to our Blog

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?

More