Hitachi Group Global Network




Middle East and Africa



The 5 Benefits of a Managed Security Service Provider
You are here: Home \ Blog
benefits of managed security service provider
Posted on Wednesday, November 8th, 2017 by
Executives have become overwhelmed with the threat of a breach, compliance, exploding security budgets and frankly, not understanding what information security really is and how it is best managed. A solution that organizations are increasingly touting is partnering with a managed security services provider (MSSP) to empower their security organizations with the people, processes and technology to secure their critical assets and data.

Topics: Managed Security Services, MSS

data breach
Posted on Tuesday, October 31st, 2017 by
Third-party vendors with lax security can pose significant risks to your network and data. Here are the data breach risks and how to reduce them.

Topics: Compliance, Managed Security Services, Security Practices

Bad Rabbit Ransomware
Posted on Friday, October 27th, 2017 by
Who is affected? Learn more about the infection method and impact of Bad Rabbit ransomware and how to prevent it from happening.

Topics: Ransomware, Tips & Tricks

Posted on Thursday, October 26th, 2017 by
One way for businesses to respond to the latest threats is through the services provided by managed security service providers at a fraction of the cost of a similar capability built in-house...

Topics: Managed Security Services, MSS

Protect Your Small Business from Cyber Attacks
Posted on Tuesday, October 24th, 2017 by
Small businesses are prime targets for cyber attacks. Follow these 5 ways to protect your small business from cyber attacks.

Topics: Security Practices

GDPR Compliance
Posted on Tuesday, October 10th, 2017 by
What you need to know about GDPR significant requirements for businesses to implement comprehensive privacy programs including mandatory privacy by design and data protection impact assessments.

Topics: Compliance, Privacy & Security

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

2017 Ransomware Trends and How to Protect Yourself Against the Malware

Topics: Ransomware

NIST compliance
Posted on Monday, September 25th, 2017 by
By December 31, 2017, federal contractors or organizations that serve the federal government will need to meet the 110 individual controls in NIST 800-171 pertaining to the handling of CUI in order to maintain compliance with the Federal Government.

Topics: Compliance, Control Assessment

Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in an APT attack.

Topics: ICS Security

Latest Webinars | Watch Now


The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now


Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?