Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Incident Response FAQ
You are here: Home \ Blog
Incident Response FAQ
Posted on Tuesday, August 28th, 2018 by
We’ve answered to the most frequently asked questions to help organizations develop an effective incident response strategy that reflects best practices, is aligned with their overall cybersecurity strategy and helps them deal with security incidents effectively.

Topics: Incident Response

Puzzle head what to know before conducting a pentest
Posted on Tuesday, August 21st, 2018 by
A penetration test, or pentest, is a process where a benign ethical hacker conducts scans, probes and attacks on a network or application to uncover vulnerabilities. In many ways it's like going to the doctor. You need a checkup, we all do. The frequency of the checkup will vary from person to person depending on health, age, medical history and much more. A pentest can be very similar in the sense that there is a third-party team of hackers or individual hacker performing an assessment on your network or application in order to determine its current security posture.

Topics: Penetration Testing

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity Crossword Puzzle
Posted on Tuesday, August 7th, 2018 by
Our first crossword puzzle has been a success! Due to popular demand, we created another one and increased the difficulty. Good luck!

Topics: Tips & Tricks

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

consideration before outsourcing security mssp
Posted on Tuesday, July 17th, 2018 by
Truth be told, every organization is unique in terms of its cybersecurity needs. Engaging with an MSSP can have tremendous advantages for certain businesses and may not be required for others. Let’s look at 3 key considerations that you should be addressed as part of your decision making: 1. Overall security requirements, 2. Security expertise, 3. Threat monitoring & incident response.

Topics: CISO, Managed Security Services, MSS

Posted on Tuesday, July 10th, 2018 by
To find out how mature you are in terms of cybersecurity, you have to undertake 6 simple steps to define your security posture.

Topics: CISO, Cybersecurity Posture, Security Practices

what's your score
Posted on Tuesday, July 3rd, 2018 by
Test your cybersecurity knowledge. Fill out this crossword puzzle and try to beat our record. Play now!

Topics: Privacy & Security, Tips & Tricks

Posted on Tuesday, June 26th, 2018 by
To define your cybersecurity budget, ask yourself what you are trying to protect, why you are trying to protect it and what your current cybersecurity posture is. Answering these questions will help you determine which security expenses you absolutely require.

Topics: CISO, Cybersecurity Posture, Security Practices

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More