Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Privacy & Data Protection Challenges in the IoT
You are here: Home \ Blog
5 steps to protect against ransomware
Posted on Tuesday, April 19th, 2016 by
Would you or your organization know what to do if your computer were infected with ransomware? Here are 5 steps you can take to avoid getting infected by this malware.

Topics: Cryptography, Ransomware, Security Practices, Tips & Tricks, Trends & Technologies

Intrusion Detection Systems (IDS) in the Context of Smart Grids and Industrial Control Systems
Posted on Thursday, April 14th, 2016 by
Should we care about Cyber-Physical System Security? You have probably heard about Stuxnet. This was a well-known instance of a cyber-physical attack in 2010 with the goal of derailing the uranium enrichment process at an Iran’s nuclear plant. This is a perfect example of a security breach in cyberspace which adversely affected the physical world. This interconnection between cyberspace and physical space offers tremendous possibilities to hackers and adversaries to do nation-wide critical infrastructure damage.

Topics: ICS Security, Security Practices

Posted on Thursday, April 7th, 2016 by
The Internet was not designed with anonymity in mind; in fact, one of the original design goals was accountability. However, anonymity has become a necessary and legitimate aim in many applications (browsing the internet, chatting, sending instant messages etc.). In these applications, encryption alone cannot maintain the anonymity required by users. The main reason for this is the fact that in this case only the communication is encrypted; it is still possible to know the source and destination of the communication.

Topics: Cryptography, Security Practices, Trends & Technologies

top 10 security tips
Posted on Thursday, March 31st, 2016 by
How can you avoid cyber threats and protect your data? Is your password secure enough? Are you safe from phishing, social engineering and malware? There are a few easy steps to follow to protect your personal and professional sensitive information. We have developed an infographic with the top 10 security tips to help you protect your data and prevent cyberattacks.

Topics: Security Practices, Tips & Tricks

Posted on Wednesday, March 23rd, 2016 by
Slideshare Presentation: Guide to Protect Company PAN: Why identifying the locations of a company assets is critical to ensure their protection?

Topics: PCI DSS

Privacy and Data Challenges in the IoT
Posted on Wednesday, March 16th, 2016 by
From toasters to medical devices, from utility grids to remote controls and from watches to construction equipment, these everyday items that we use to live, work, play and learn are being connected to the World Wide Web (WWW) in an unprecedented phenomenon call the Internet of Things (IoT). This phenomenon raises privacy and data protection challenges that need to be addressed...

Topics: Internet of Things

building trust relationship with mssp
Posted on Tuesday, March 8th, 2016 by
When it comes to trusting your MSSP, it’s quite a big deal. You are basically inviting a third party to get under your kimono. For a threat monitoring service to be effective, the service provider needs to have access to all network traffic and to have the ability to perform deep packet analysis in many cases to determine if there is a real evolving threat or not. That begs the question: what can your service provider see or not see?

Topics: Managed Security Services, MSS, Security Practices

Secure Coding Principles Don't Trust Services
Posted on Tuesday, March 1st, 2016 by
Who is responsible to handle external code issues? How am I dealing with vulnerabilities? Which ones do I need to mitigate or sometimes to accept? And finally what is the easiest way for me to search for vulnerabilities? Sometime I feel more like a risk manager than a software architect! For this reason, I decided to elaborate on the word SECURE in the context of Software Development Life Cycle (SDLC) and one of its phases, Development/Coding.

Topics: Uncategorized

Why We Love Semantics in IT Security
Posted on Wednesday, February 24th, 2016 by
Semantics is the study of meaning that is used for understanding human expression through language. It focuses on the relation between signifiers such as words, phrases, signs, and symbols, and what they stand for. In IT security, when we refer to semantics, we usually refer to “Semantic Event Correlation”. You have surely noticed these terms in the company brochures you received by email last week. While scrolling down the PDF, you could not avoid...

Topics: Data Mining, Trends & Technologies

hitachi systems security - tips-for-protecting-yourself-from-phishing
Posted on Tuesday, February 16th, 2016 by
A survey by McAfee from 2014-2015 showed that 97% of people globally are unable to identify phishing emails. I'm going to take a few minutes to lead you through the most important things you need to know to avoid being victimized by this technique.

Topics: Phishing, Tips & Tricks

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now