Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

How to Build a Successful Security Program: 4 Things You Should Consider
You are here: Home \ Blog
industrial-control-systems-and-internet-technologies-a-tale-of-two-industries
Posted on Wednesday, September 14th, 2016 by
Can Industrial Control Systems and Internet Technologies work together? We’ve come a long way since the time when the merging of these two technologies was first discussed in earnest. While progress has been made, we still have a long way to go. Industrial Control Systems Security remains a critical issue...

Topics: ICS Security

How to Build a Successful Security Program- 4 Things You Should Consider
Posted on Thursday, September 1st, 2016 by
As security professionals, we are responsible for protecting our corporate data against cyber threats on a 24/7 basis. But what does it take to build a successful security program?There are several easy steps to take to build an effective information security program following the control-based approach. Here are 4 things you should consider to help create a successful security program.

Topics: CISO, Risk management, Security Practices, Tips & Tricks

5 Reasons Why IT Incident Management Doesn’t Work
Posted on Tuesday, August 23rd, 2016 by
The typical goal of IT Incident Management is not to identify evidence but rather to restore the status quo. There is no concern about the 2 important pieces of security which are integrity and confidentiality it rather focuses on a 100% of availability. Discover the 5 main reasons why we shouldn’t follow the same methodology for security incidents as regular incidents.

Topics: Security Practices

How Threat Risk Assessments May Prevent Data Leaks
Posted on Monday, August 15th, 2016 by
Recent cases of health data breaches have been reported by the news, such as the Arizona-based Banner Health that experienced a cybersecurity attack potentially affecting 3.7 million patients. The data might have been compromised after an organization’s employee accessed corporate data outside of normal job duties, without following existing regulations.Such examples show how attacks targeting companies’ assets and critical information, often resulting in major data breaches, are increasing and becoming a dominant a source of concern. Although it is impossible to remove all risks to organizations, it is possible to reevaluate a company’s strategy towards risk, and decide which risks it is going to accept in order to reduce its risk exposure. The first step your company should be considering is a Threat Risk Assessment.

Topics: Threat Risk Assessments

Threat Risk Assessment - Learning From New Sources
Posted on Tuesday, August 2nd, 2016 by
Security professionals managing risk programs can learn new approaches to assessing risks from a variety of non-security environments. One recent personal experience serves as an excellent example of how we can learn from new, and sometimes painful, situations.

Topics: Security Practices, Threat Risk Assessments

Webinar How to Pass a Security Audit in One Day
Posted on Tuesday, July 26th, 2016 by
Conducting security audits is necessary to ensure the protection, confidentiality, integrity and availability of your data and avoid brand damage. Unfortunately, security audits can be a time-consuming process that might last up to a year!

Topics: Security Practices, Tips & Tricks

Do Quantum Computers Mean the End of HTTPS
Posted on Wednesday, July 20th, 2016 by
Why HTTPS might not be as secure as before...

Topics: Cryptography, Trends & Technologies

Measures against targeted email attacks
Posted on Tuesday, July 12th, 2016 by
Most of the victims of targeted email attacks have no knowledge or little to no training to properly spot the warning signs of such attacks. Instead, they fall prey to targeted email attacks and cause their organizations financial losses, stolen data and virus infections. To stay secure at all times, different preventative measures need to be taken.

Topics: Security Practices, Tips & Tricks

Above Security - 6 principles of resilience
Posted on Tuesday, June 21st, 2016 by
What is organizational resilience and how can it be applied to risk management and enterprise security to protect your organization? Find out more about how the 6 principles of resilience that can help you deal with everyday cyber threats and protect your confidential data.

Topics: CISO, Enterprise Security Architecture, Security Practices, Tips & Tricks

How to Build a Simple Backdoor
Posted on Tuesday, June 14th, 2016 by
Sometimes in IT security the simplest things work best. Learn how to build a backdoor in 30 lines of code with a method for regaining access to the machine you have compromised. The code is very simple!

Topics: Security Practices, Tips & Tricks

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now