Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Cybersecurity Crossword Puzzle #1
You are here: Home \ Blog
what's your score
Posted on Tuesday, July 3rd, 2018 by
Test your cybersecurity knowledge. Fill out this crossword puzzle and try to beat our record. Play now!

Topics: Privacy & Security, Tips & Tricks

Posted on Tuesday, June 26th, 2018 by
To define your cybersecurity budget, ask yourself what you are trying to protect, why you are trying to protect it and what your current cybersecurity posture is. Answering these questions will help you determine which security expenses you absolutely require.

Topics: CISO, Cybersecurity Posture, Security Practices

where-do-i-start
Posted on Tuesday, June 19th, 2018 by
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes.

Topics: CISO, Controls, Cybersecurity Posture, Risk management, Security Practices, Threat Risk Assessments

what is a cybersecurity posture assessment
Posted on Tuesday, June 12th, 2018 by
When it comes to choosing the right cybersecurity strategy, how are organizations supposed to know what is best? Should you conduct regular penetration testing, vulnerability assessments, control assessments, compliance audits, risk assessments, security program reviews, etc.? The list goes on! How often should this be done? And how can you be sure that these initiatives will actually pay off?

Topics: CISO, Cybersecurity Posture, Security Practices

GDPR Privacy by Design
Posted on Tuesday, June 5th, 2018 by
The GDPR imposes Privacy by Design and privacy as the default setting to all controllers. This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing.

Topics: Compliance, Privacy & Security

Difference Vulnerability Scan vs Vulnerability Assessment
Posted on Tuesday, May 29th, 2018 by
Knowing how to run a vulnerability scan and getting a list of vulnerabilities doesn’t make you a security specialist. You may think you know what a security assessment is, but the reality is that you might not.

Topics: Security Practices, Vulnerability Assessment, Vulnerability Management

Risk ahead sign
Posted on Thursday, May 24th, 2018 by
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks.

Topics: Controls, Risk management, Security Practices

GDPR Canada
Posted on Friday, May 18th, 2018 by
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis.

Topics: Compliance, Privacy & Security

cis controls and gdpr compliance
Posted on Tuesday, May 15th, 2018 by
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance.

Topics: CISO, Compliance, Controls, Privacy & Security

Facts Myths - GDPR
Posted on Tuesday, May 8th, 2018 by
Understand what GDPR compliance is really about, why ticking a checkbox is not enough, and how you can approach your GDPR compliance efforts for lasting success.

Topics: Compliance, Privacy & Security

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More