Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

What is IoT Security and Why is it Important for Businesses?
You are here: Home \ Blog
IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management

RIsk Management_Hitachi Systems Security

Topics: Managed Security Services, MSS, Risk management

Next-Gen MSS Platform
Posted on Tuesday, November 20th, 2018 by
Companies are demanding next-generation MSS platforms that have evolved beyond the conventional IT infrastructure. In addition to data protection, MSSPs must now deal with expanding attack surfaces, make sense of huge data amounts and facilitate convergence between their customers' IT, OT and IoT environments. Find out what your MSSP should be able to do to address your growing needs and manage your risk.

Topics: Managed Security Services, MSS

Plan Your Cybersecurity Projects
Posted on Tuesday, November 13th, 2018 by
Are you managing several cybersecurity projects at the same time? Do you feel that you could manage your projects more effectively, but don’t know where to start? We’ve compiled 6 steps that will help you plan your cybersecurity projects more effectively

Topics: Security Practices, Tips & Tricks

cybersecurity project management challenges and solutions
Posted on Tuesday, November 6th, 2018 by
Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them.

Topics: Security Practices, Tips & Tricks

cybersecurity project management best practices
Posted on Tuesday, October 30th, 2018 by
Are you struggling with managing several cybersecurity projects at the same time? Would you like some guidance when selecting the “right” cybersecurity projects for your business context? Do you have a feeling that you could manage them more effectively, for your own sake and for the sake of your organization? If you’ve answered yes to any of these questions, we’ve compiled several best practices that can help you manage your cybersecurity projects more effectively.

Topics: Cybersecurity Posture, Security Practices, Tips & Tricks

executive insights on IT pros challenges
Posted on Tuesday, October 23rd, 2018 by
Security executives from different industries and backgrounds chat about common challenges for IT professionals. Our executives shared great tips for building a solid cybersecurity pitch to the Board of Directors and the executive management team.

Topics: CISO, Controls, Cybersecurity Posture, Internet of Things, Tips & Tricks

cybersecurity project management
Posted on Tuesday, October 16th, 2018 by
For cybersecurity projects to be effective, IT and security professionals need to implement a solid project management practice. An experienced project management team can help ensure that your projects are executed smoothly, stay on budget and are completed within the timeframe that was agreed upon.

Topics: Security Practices

123456789 ... 18 ...

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More