Hitachi Group Global Network




Middle East and Africa



Eliminating Security Gaps with Vulnerability Assessments
You are here: Home \ Blog
Incident Response
Posted on Tuesday, August 22nd, 2017 by
Over 80% of small and midsized organizations reported suffering at least one cyberattack in the last 12 months, with an average cost of nearly $1 million to restore servers, databases, other systems and data to return to normal business operation after a successful attack. The results of these attacks are staggering: 60% of small companies that suffer a cyberattack are out of business within six months of the attack as suggested by the National Cyber Security Alliance. With such high costs associated with significant attacks, organizations must be prepared to detect and respond to attackers if they are to limit damage and subsequently reduce costs to maintain their business.

Topics: Incident Response, Security Practices

Eliminating Security Gaps with Vulnerability Assessments
Posted on Tuesday, August 15th, 2017 by
Want to eliminate the security gaps in your IT infrastructure? Your first stop should be vulnerability assessments.

Topics: Vulnerability Assessment

Weakness on Warning Road Sign
Posted on Tuesday, August 8th, 2017 by
Is your business ready for a cyber attack? The cyber security threat landscape is clearly more dangerous now than any time in history. While, historically, wars have been fought in the air, on land and on the seas, it now appears that the next war will be fought (or will begin) in cyber space. What are the next cyber threats to look out for and when will Executives take notice?

Topics: CISO, DDoS, Digital Transformation, Penetration Testing, Phishing, Ransomware, Vulnerability Assessment

jigsaw puzzle
Posted on Tuesday, August 1st, 2017 by
How to do a Penetration Test in 5 steps.

Topics: Penetration Testing

2017 Trends
Posted on Tuesday, July 25th, 2017 by
Recent trends in cybersecurity attacks: threat actors involved, tactics used, and the industries targeted. The intent of this analysis of cybersecurity incident information can hopefully help organizations improve threat response time, improve cybersecurity defenses, and allocate cybersecurity resources more effectively.

Topics: DDoS, ICS Security, Phishing, Privacy & Security, Ransomware, Security Practices

How Banks Avoided the WannaCry Cyberattacks
Posted on Tuesday, July 18th, 2017 by
The WannaCry attack started in May of 2017, and within one day it was reported to have affected more than 230,000 devices in over 150 different countries. It hit major hospitals, car manufacturers, and even large telecommunications companies, yet one industry seemed to escape largely unscathed -- banking. While banks have been among the most popular targets for cyberattacks in the past, it seems this is at least one clear instance where the banks have benefited from adopting and evolving better cybersecurity practices and controls. Let’s take a closer look at what types of practices enabled banks to avoid the WannaCry ransomware epidemic.

Topics: Control Assessment, Ransomware, Security Practices

Above Security is becoming Hitachi Systems Security
Posted on Monday, July 10th, 2017 by
Hitachi Systems, Ltd. (“Hitachi Systems”), a wholly owned subsidiary of Hitachi, Ltd. (TSE: 6501), today announced that it will change the company name of Above Security Inc. to Hitachi Systems Security Inc.

Topics: Managed Security Services

Vulnerability Assessment
Posted on Tuesday, July 4th, 2017 by
As many as 15,000 new vulnerabilities are discovered each year, with many affecting major software systems including web browsers, operating systems, and other applications. Vulnerabilities, including missing patches and misconfigured applications, expose weaknesses to attackers and open organizations to costly cyber-attacks. In order to secure their IT assets, organizations today must maintain an awareness of the vulnerabilities in their environment and respond quickly to mitigate potential threats. One way to do so is through regular vulnerability assessments, a process to identify and quantify the security vulnerabilities in an organization’s environment. A vulnerability assessment program provides organizations with the knowledge, awareness, and risk background necessary to understand threats to their environment and react accordingly.

Topics: Risk management, Vulnerability Assessment

Threat management
Posted on Tuesday, June 27th, 2017 by
How can threat management protect your business from cyberattacks? It’s simple: a combination of threat monitoring, IDS, and a proactive security approach.

Topics: Security Practices

Vulnerability Assessment and Vulnerability Management Strategy
Posted on Tuesday, June 27th, 2017 by
Why regular vulnerability assessments help eliminating security gaps

Topics: Vulnerability Assessment

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now