Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Digital Privacy Act: An Update to Canadian Data Privacy Regulations
You are here: Home \ Blog
Digital Privacy Act Canada
Posted on Tuesday, January 8th, 2019 by
In order to harmonize the Canadian requirements to the General Data Protection Regulation (GDPR) in the European Union, the Government of Canada issued final provisions on the mandatory reporting and recording of privacy breaches according to Canada’s PIPEDA. The new regulations, also known as the Digital Privacy Act, came into force on November 1st, 2018. Under the Digital Privacy Act, Canadian and non-Canadian organizations subject to PIPEDA will need to take necessary steps for compliance. This amendment to Canadian federal law primarily relates to three areas: 1. Data breach record keeping, 2. Data breach reporting and 3. Data breach notification.

Topics: Compliance, Cyber Law, Privacy & Security

Pentest Exploits
Posted on Wednesday, January 2nd, 2019 by
We’ve put together some of today’s most common pentest exploits and offer guidance on how to remediate them effectively to strengthen your organization's cybersecurity posture and better manage your risk. Common pentest exploits include: 1. Password Vulnerabilities, 2. OS and Endpoint Application Vulnerabilities, 3. Misconfiguration Vulnerabilities, 4. ...

Topics: Penetration Testing, Tips & Tricks, Uncategorized, Vulnerability Assessment

IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management

RIsk Management_Hitachi Systems Security

Topics: Managed Security Services, MSS, Risk management

Next-Gen MSS Platform
Posted on Tuesday, November 20th, 2018 by
Companies are demanding next-generation MSS platforms that have evolved beyond the conventional IT infrastructure. In addition to data protection, MSSPs must now deal with expanding attack surfaces, make sense of huge data amounts and facilitate convergence between their customers' IT, OT and IoT environments. Find out what your MSSP should be able to do to address your growing needs and manage your risk.

Topics: Managed Security Services, MSS

Plan Your Cybersecurity Projects
Posted on Tuesday, November 13th, 2018 by
Are you managing several cybersecurity projects at the same time? Do you feel that you could manage your projects more effectively, but don’t know where to start? We’ve compiled 6 steps that will help you plan your cybersecurity projects more effectively

Topics: Security Practices, Tips & Tricks

cybersecurity project management challenges and solutions
Posted on Tuesday, November 6th, 2018 by
Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them.

Topics: Security Practices, Tips & Tricks

cybersecurity project management best practices
Posted on Tuesday, October 30th, 2018 by
Are you struggling with managing several cybersecurity projects at the same time? Would you like some guidance when selecting the “right” cybersecurity projects for your business context? Do you have a feeling that you could manage them more effectively, for your own sake and for the sake of your organization? If you’ve answered yes to any of these questions, we’ve compiled several best practices that can help you manage your cybersecurity projects more effectively.

Topics: Cybersecurity Posture, Security Practices, Tips & Tricks

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More