Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Vulnerability Scan vs Vulnerability Assessment
You are here: Home \ Blog
Difference Vulnerability Scan vs Vulnerability Assessment
Posted on Tuesday, May 29th, 2018 by
Knowing how to run a vulnerability scan and getting a list of vulnerabilities doesn’t make you a security specialist. You may think you know what a security assessment is, but the reality is that you might not.

Topics: Security Practices, Vulnerability Assessment, Vulnerability Management

Risk ahead sign
Posted on Thursday, May 24th, 2018 by
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks.

Topics: Controls, Risk management, Security Practices

GDPR Canada
Posted on Friday, May 18th, 2018 by
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis.

Topics: Compliance, Privacy & Security

cis controls and gdpr compliance
Posted on Tuesday, May 15th, 2018 by
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance.

Topics: CISO, Compliance, Controls, Privacy & Security

Facts Myths - GDPR
Posted on Tuesday, May 8th, 2018 by
Understand what GDPR compliance is really about, why ticking a checkbox is not enough, and how you can approach your GDPR compliance efforts for lasting success.

Topics: Compliance, Privacy & Security

solutions SIEM Limitations
Posted on Tuesday, May 1st, 2018 by
Having a SIEM doesn’t automatically mean that your organization is secure. However, there are several possible solutions that can help organizations address their SIEM limitations.

Topics: Managed Security Services, SIEM

siem benefits and limitations
Posted on Tuesday, April 24th, 2018 by
SIEMs don’t fully protect your corporate’s IT environment against newly emerging cyber-attacks. Much like other technology solutions, they need continuous 24/7 maintenance and some additional controls to be deployed to work effectively.

Topics: Managed Security Services, MSS, SIEM

Data Protection Officer
Posted on Tuesday, April 17th, 2018 by
How to determine whether you need to hire, promote or assign a Data Protection Officer; and how to choose your DPO efficiently.

Topics: Compliance, Privacy & Security

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, April 10th, 2018 by
Often-overlooked, lessons learned exercises can help organizations improve their incident response planning capabilities going forward.

Topics: Incident Response, Security Practices

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, April 3rd, 2018 by
Each jurisdiction imposes data protection standards with regards to when and how organizations should or must disclose data breaches. This allows individuals whose personal information has been compromised to take remedial steps to avoid potential adverse consequences, such as financial losses or identity theft. As part of our 5-part series, this article dives deeper into the different jurisdictions that organizations in today’s globalized world may be subject to.

Topics: Compliance, Cyber Law, Incident Response

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More