Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Webinar . The Next Generation of Managed Security
You are here: Home \ Blog
nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Posted on Monday, February 4th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Artificial Intelligence, Managed Security Services, MSS, Webinar AI, Big Data, Machine Learning

Data privacy is the fundamental right of us
Posted on Tuesday, January 29th, 2019 by
Is Data Privacy Beneficial to the Business or Just the Customer?   2019 has started with a data privacy bang. The French National Data Protection Commission (CNIL) has fined Google around $57 million for privacy violations under the GDPR. The ruling was based on non-compliance with consent to process data as outlined in the General...

Topics: BIg Data, Compliance, Cyber Law, Enterprise Security Architecture, Managed Security Services, Penetration Testing, Security Practices, Tips & Tricks

Smart City Privacy
Posted on Tuesday, January 22nd, 2019 by
As our cities become smarter, is the use of data also smart? Is privacy being driven from the city walls to be replaced only by efficiency and convenience? We're looking at several examples from smart city projects around the world to find out how and if smart city technologies respect modern data privacy concerns.

Topics: Artificial Intelligence, Digital Transformation, Internet of Things, IoT Security, Privacy & Security, Trends & Technologies

How to secure the IoT environment
Posted on Tuesday, January 15th, 2019 by
We've developed our top 10 tips for businesses to secure their Internet of Things (IoT) environment and devices. 1. Robust Authentication, 2. Encryption and PKI, 3. Security Logging, 4. ...

Topics: Cloud Security, Internet of Things, IoT Security

Digital Privacy Act Canada
Posted on Tuesday, January 8th, 2019 by
In order to harmonize the Canadian requirements to the General Data Protection Regulation (GDPR) in the European Union, the Government of Canada issued final provisions on the mandatory reporting and recording of privacy breaches according to Canada’s PIPEDA. The new regulations, also known as the Digital Privacy Act, came into force on November 1st, 2018. Under the Digital Privacy Act, Canadian and non-Canadian organizations subject to PIPEDA will need to take necessary steps for compliance. This amendment to Canadian federal law primarily relates to three areas: 1. Data breach record keeping, 2. Data breach reporting and 3. Data breach notification.

Topics: Compliance, Cyber Law, Privacy & Security

Pentest Exploits
Posted on Wednesday, January 2nd, 2019 by
We’ve put together some of today’s most common pentest exploits and offer guidance on how to remediate them effectively to strengthen your organization's cybersecurity posture and better manage your risk. Common pentest exploits include: 1. Password Vulnerabilities, 2. OS and Endpoint Application Vulnerabilities, 3. Misconfiguration Vulnerabilities, 4. ...

Topics: Penetration Testing, Resource, Tips & Tricks, Uncategorized, Vulnerability Assessment

IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Resource, Uncategorized

Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management, Trends & Technologies

123456789 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now