Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Dragonfly 2.0 Targets Energy Sector Gaining Access to SCADA Systems
You are here: Home \ Blog
Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in APT attack.

Topics: ICS

Posted on Tuesday, September 12th, 2017 by
Penetration Tests offer a real time analysis of an organizations security posture by identifying vulnerabilities and a plan to eliminate them in order of criticality
Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
  Cyber Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves...
Penetration Testing is a Critical Component of PCI Compliance
Posted on Tuesday, August 29th, 2017 by
For any business that handles credit card data, penetration testing has been a requirement since 2013. See how a pentest can help your organization become PCI compliant.
Incident Response
Posted on Tuesday, August 22nd, 2017 by
Over 80% of small and midsized organizations reported suffering at least one cyberattack in the last 12 months, with an average cost of nearly $1 million to restore servers, databases, other systems and data to return to normal business operation after a successful attack. The results of these attacks are staggering: 60% of small companies that suffer a cyberattack are out of business within six months of the attack as suggested by the National Cyber Security Alliance. With such high costs associated with significant attacks, organizations must be prepared to detect and respond to attackers if they are to limit damage and subsequently reduce costs to maintain their business.
123456789 ... 18 ...

Categories

Articles by Month