Hitachi Group Global Network




Middle East and Africa



Best Practices for Building an Incident Response Plan
You are here: Home \ Blog
Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, March 20th, 2018 by
As part of our 5-part series about Incident Response Planning (IRP), this article dives deeper into several best practices to keep in mind when building an Incident Response Plan.

Topics: Incident Response, Security Practices

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, March 13th, 2018 by
We’ve compiled a 5-part series about Incident Response Planning to help organizations understand what IRP is, what they should consider when implementing IRP, and how they can leverage IRPs to secure themselves against cyberthreats. Part 1 outlines the 5 main benefits of implementing an Incident Response Plan.

Topics: Incident Response, Managed Security Services, Security Practices

Posted on Tuesday, March 6th, 2018 by
We’ve gathered a collection of the most frequently asked questions around security controls that may help your organization identify the types of controls that will be most helpful to improve your security maturity, achieve compliance and strengthen your defenses against data breaches and security incidents.

Topics: CISO, Control Assessment, Controls

Posted on Tuesday, February 27th, 2018 by
Curious about how to stay up to speed with Penetration Testing? We’ve gathered 10 useful resources vetted by Hitachi Systems Security’s own Penetration Testers that will help you keep up with the rapidly evolving landscape of ethical hacking.

Topics: Penetration Testing

vulnerability assessments vs vulberability management
Posted on Monday, February 19th, 2018 by
The terms vulnerability scans, vulnerability assessments and vulnerability management are often mixed up and still cause confusion on many accounts. To make sure that your organization can focus on the most effective tactics when it becomes to dealing with vulnerabilities, we’ve explained the main differences between vulnerability assessments and vulnerability management once and for all.

Topics: Managed Security Services, MSS, Vulnerability Assessment, Vulnerability Management

20 cis controls
Posted on Monday, February 12th, 2018 by
Issued by the Center for Internet Security (CIS), the so-called Critical Security Controls for Effective Cyber Defense present 20 effective actions an organization can take to reduce its risk, strengthen its security posture and lower operational costs. A security control is a safeguard or countermeasure to avoid, detect, counteract or minimize “security” risks to a company’s assets. If you'd like to learn more, here is an overview of the 20 CIS Controls.

Topics: ArkAngel, CISO, Controls

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: ArkAngel, Control Assessment, Controls, Managed Security Services, Uncategorized

atm machine
Posted on Monday, January 29th, 2018 by
One way to prevent ATM fraud is to monitor the ATM network directly and on a 24/7 basis. The objective of ATM Monitoring is to stop client data theft by preventing malicious individuals from infiltrating the system directly through ATMs or by using malware that infects the organization from inside to eventually reach ATMs.

Topics: ArkAngel, Managed Security Services

Vulnerability Management - Hitachi Systems Security
Posted on Friday, January 26th, 2018 by
What is Vulnerability Management? Vulnerability management is the process of identifying, analyzing, fixing, and reporting on security vulnerabilities in systems and the software that runs them. Once vulnerabilities are found, they must be prioritized based on which ones pose the most dangerous threat to the organization.

Topics: ArkAngel, Managed Security Services, Risk management

Cloud Security
Posted on Wednesday, January 24th, 2018 by
Monitoring Office 365 logs offers a variety of benefits for organizations, including increased security maturity or enhanced detection capabilities, which are traditionally part of Data Loss Prevention (DLP) solutions. By monitoring and analyzing Office 365 security logs in a structured way...

Topics: ArkAngel, Cloud Security, Office 365

Stay up to date! Subscribe to our Blog

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?