Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

9 Reasons for Data Privacy
You are here: Home \ Blog
Data privacy is the fundamental right of us
Posted on Tuesday, January 29th, 2019 by
Is Data Privacy Beneficial to the Business or Just the Customer?   2019 has started with a data privacy bang. The French National Data Protection Commission (CNIL) has fined Google around $57 million for privacy violations under the GDPR. The ruling was based on non-compliance with consent to process data as outlined in the General...

Topics: BIg Data, Compliance, Cyber Law, Enterprise Security Architecture, Managed Security Services, Penetration Testing, Security Practices, Tips & Tricks

Smart City Privacy
Posted on Tuesday, January 22nd, 2019 by
As our cities become smarter, is the use of data also smart? Is privacy being driven from the city walls to be replaced only by efficiency and convenience? We're looking at several examples from smart city projects around the world to find out how and if smart city technologies respect modern data privacy concerns.

Topics: Artificial Intelligence, Digital Transformation, Internet of Things, IoT Security, Privacy & Security

How to secure the IoT environment
Posted on Tuesday, January 15th, 2019 by
We've developed our top 10 tips for businesses to secure their Internet of Things (IoT) environment and devices. 1. Robust Authentication, 2. Encryption and PKI, 3. Security Logging, 4. ...

Topics: Cloud Security, Internet of Things, IoT Security

Digital Privacy Act Canada
Posted on Tuesday, January 8th, 2019 by
In order to harmonize the Canadian requirements to the General Data Protection Regulation (GDPR) in the European Union, the Government of Canada issued final provisions on the mandatory reporting and recording of privacy breaches according to Canada’s PIPEDA. The new regulations, also known as the Digital Privacy Act, came into force on November 1st, 2018. Under the Digital Privacy Act, Canadian and non-Canadian organizations subject to PIPEDA will need to take necessary steps for compliance. This amendment to Canadian federal law primarily relates to three areas: 1. Data breach record keeping, 2. Data breach reporting and 3. Data breach notification.

Topics: Compliance, Cyber Law, Privacy & Security

Pentest Exploits
Posted on Wednesday, January 2nd, 2019 by
We’ve put together some of today’s most common pentest exploits and offer guidance on how to remediate them effectively to strengthen your organization's cybersecurity posture and better manage your risk. Common pentest exploits include: 1. Password Vulnerabilities, 2. OS and Endpoint Application Vulnerabilities, 3. Misconfiguration Vulnerabilities, 4. ...

Topics: Penetration Testing, Tips & Tricks, Uncategorized, Vulnerability Assessment

IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management

RIsk Management_Hitachi Systems Security

Topics: Managed Security Services, MSS, Risk management

Next-Gen MSS Platform
Posted on Tuesday, November 20th, 2018 by
Companies are demanding next-generation MSS platforms that have evolved beyond the conventional IT infrastructure. In addition to data protection, MSSPs must now deal with expanding attack surfaces, make sense of huge data amounts and facilitate convergence between their customers' IT, OT and IoT environments. Find out what your MSSP should be able to do to address your growing needs and manage your risk.

Topics: Managed Security Services, MSS

123456789 ... 18 ...

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More