Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Data Security Regulations for Retail and Manufacturing
You are here: Home \ Blog
Posted on Tuesday, May 28th, 2019 by
Organizations that fall under the remit of retail and manufacturing have to often deal with both general data protection regulations and industry-specific ones, such as financial transaction security. This is the third article in our series on data security and protection regulations in different industries, this time about retail and manufacturing. Whilst the first two posts on the finance sector and healthcare looked at very specific regulations, this sector has a wider scope.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 21st, 2019 by
Healthcare, like other industry sectors, has become part of the new wave of digital transformation. The industry is heavily dependent on digital data, including highly sensitive patient data. Therefore, healthcare has been the target for cybercrime for many years; health information is a valuable commodity which is not lost on cybercriminals. In this second post about data security regulations, we are turning our attention to data security regulations in the healthcare industry, including HIPAA and HITECH.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 14th, 2019 by
Our economic landscape is filled with a mosaic of specific data security rules and regulations across multiple industries such as finance, healthcare and retail. In this blog article, we provide an overview of some of the most commonly-cited data security regulations for the financial services industry, including GLBA, SOX, PCI DSS, 23 NYCRR 500 and several others.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 7th, 2019 by
It's been almost a year since GDPR came into effect. What has happened since then? What are the lessons learned? Why is data privacy a business priority? And how can you reevaluate your level of GDPR preparedness? Find out more in our blog article.

Topics: Cyber Law, Privacy & Security, Security Practices, Tips & Tricks

Posted on Tuesday, April 30th, 2019 by
Issued in March 2017, the main objective of 23 NYCRR 500 is to establish better protect consumer data privacy in the financial, banking and insurance industries across the United States. In this first blog article about 23 NYCRR 500, we will outline some key points to help you get a better understanding of the impact of the recent regulation.

Topics: Compliance, Cyber Law, Privacy & Security, Security Practices

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, April 16th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. Do you know the most commonly-used terms and terminologies when it comes to the darknet? Test your knowledge in our darknet crossword puzzle!

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 9th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. This forms a well of intelligence that we can apply to our own threat prevention needs. However, this most hidden part of the wider Internet needs the right tools to explore its murky depths. How does darknet intelligence help us fight cybercrime? How can we leverage the hidden depths of the darknet to gain actionable information?

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 2nd, 2019 by
The darknet remains clouded in mystery for many of us. When you think of the darknet, you think of nefarious people doing dastardly things. It seems a place that is hard to define and difficult to locate. And, if you could, would you want to enter its dark domain? In this article, we’ll look at what lurks beneath the surface of the internet.

Topics: Cyber Law, Ransomware

Posted on Tuesday, March 26th, 2019 by
In this blog article, we will shed a light on the increasingly popular concept of smart cars, give examples for possible smart car security threats and provided recommendations for how to prevent your smart car from being outsmarted.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, IoT Security, Machine Learning, Penetration Testing, Privacy & Security, Trends & Technologies

123456789 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now