Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Why Do A Cloud Security Assessment?
You are here: Home \ Blog
Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

People_Cybercrime_2019
Posted on Friday, December 20th, 2019 by
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social engineering are so prevalent that Proofpoint announced that 99% of all cyber-attacks need human intervention to proceed. In order to counter this, security awareness...

Topics: Cybercrime, Cybersecurity Posture, Deepfake, Penetration Testing, Ransomware, Social Engineering, Supply Chain

Posted on Thursday, December 12th, 2019 by
As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and also found areas of concern around security.

Topics: Cloud Security, Cybersecurity Posture, Darknet Intelligence, DDoS, Vulnerability Assessment

data privacy roundup
Posted on Thursday, December 5th, 2019 by
How did the state of data privacy impact the global economy in 2019? It is highly likely that the year 2019 will be remembered as the era of data privacy. In this article, we talk about privacy trends and developments in 2019, including GDPR, CCPA, privacy by design, etc.

Topics: Compliance, GDPR, Privacy & Security, Trends & Technologies, Uncategorized

Ransomware Infection
Posted on Wednesday, November 27th, 2019 by
You’ve been infected with ransomware… now what? And what are some effective tips to prevent ransomware infection? Ransomware is a type of malware that continues to cause havoc across the world. In this blog article, we are sharing 5 effective tips to help your business prevent ransomware infections.

Topics: Phishing, Ransomware, Security Practices, Social Engineering, Tips & Tricks, Trends & Technologies

Black Friday Shopping
Posted on Wednesday, November 20th, 2019 by
Many of us eagerly await the annual Black Friday offers to get a good deal on holiday presents (or gifts to self!). Unfortunately, Black Friday is also a great opportunity for cybercriminals looking to scam customers out of hard-earned money and valuable personal data.  As we prepare for Black Friday shopping, what should online shoppers watch out for and how can they protect themselves against scams?

Topics: Phishing, Security Practices, Social Engineering, Tips & Tricks, Uncategorized

Deepfakes and Cybercrime
Posted on Thursday, November 14th, 2019 by
How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?  Back in 2018, researchers found 14,698 deepfake videos online. But what is this phenomenon about and how will it affect businesses and individuals in the years to come? 

Topics: Artificial Intelligence, Cybersecurity Posture, Digital Transformation, Phishing, Social Engineering, Trends & Technologies, Uncategorized

Healthcare Data Privacy
Posted on Thursday, November 7th, 2019 by
Healthcare is arguably one of the most data-driven business there is, which is why health data privacy is becoming a widely discussed topic. What is healthcare data and why does privacy matter? Which regulations cover healthcare data privacy? Learn about HIPAA, HITECH, PIPEDA, etc.

Topics: Compliance, GDPR, Privacy & Security, Tips & Tricks, Trends & Technologies, Uncategorized

Credit Unions Cybersecurity Posture
Posted on Thursday, October 31st, 2019 by
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history. In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.

Topics: Compliance, Control Assessment, Cybersecurity Posture, Security Practices, Tips & Tricks, Uncategorized

Posted on Thursday, October 17th, 2019 by
In this blog article, we're talking about what a privacy violation is and give examples of privacy violations across industries. We're also providing guidance about how organizations can make sure that they don’t end up in the crosshairs of the FTC and similar bodies, e.g. by implementing privacy frameworks such as NIST or the GDPR.

Topics: Privacy & Security

123456789 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now