Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Smart Car Security Threats: Is the Connected Car a Good Idea?
You are here: Home \ Blog
Posted on Tuesday, March 26th, 2019 by
In this blog article, we will shed a light on the increasingly popular concept of smart cars, give examples for possible smart car security threats and provided recommendations for how to prevent your smart car from being outsmarted.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, IoT Security, Machine Learning, Penetration Testing, Privacy & Security, Trends & Technologies

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Cybersecurity Crossword Puzzle
Posted on Tuesday, March 12th, 2019 by
Here is our new crossword puzzle for your entertainment, this time about the topic of data privacy! Put your data privacy knowledge to the test and let us know if you'll be able to crack it in less than 3 minutes... Good luck!

Topics: Compliance, Privacy & Security, Tips & Tricks

Posted on Tuesday, March 5th, 2019 by
Similar to what is currently being applied by the European Union via the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) brings to the United States a new set of data privacy rights and compliance obligations. What does this mean for organizations? In short, businesses inside and outside of California may be affected by this new privacy legislation. Business owners, executives and privacy professionals should therefore prepare for January 1, 2020.

Topics: Compliance, Cyber Law, Privacy & Security, Resource, Tips & Tricks, Uncategorized

Posted on Tuesday, February 26th, 2019 by
In this blog article, we outline what cloud security is and how cloud migration enables executives and business owners. Learn more about the difference between cloud security and traditional IT security, and find out why it is important to secure your cloud environment before, during and after cloud migration.

Topics: Cloud Security, Managed Security Services, Office 365 Security

Posted on Tuesday, February 19th, 2019 by
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping. Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.

Topics: Compliance, Cyber Law, Cybersecurity Posture, IoT Security, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, February 12th, 2019 by
Today’s Managed Security Service Providers need to leverage a variety of next-generation technologies, not just to stay on top their game but also to offer their customers the best possible protection possible. These technologies include big data analytics, automation, artificial intelligence and machine learning.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, Machine Learning, Managed Security Services, MSS, Privacy & Security, Trends & Technologies

Posted on Sunday, February 10th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Compliance, Cyber Law, Digital Transformation, Privacy & Security

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Posted on Monday, February 4th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Artificial Intelligence, Managed Security Services, MSS, Webinar AI, Big Data, Machine Learning

123456789 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now