Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Incident Response FAQ
You are here: Home \ Blog
Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Incident Response FAQ
Posted on Tuesday, August 28th, 2018 by
We’ve answered to the most frequently asked questions to help organizations develop an effective incident response strategy that reflects best practices, is aligned with their overall cybersecurity strategy and helps them deal with security incidents effectively.

Topics: Incident Response

Puzzle head what to know before conducting a pentest
Posted on Tuesday, August 21st, 2018 by
A penetration test, or pentest, is a process where a benign ethical hacker conducts scans, probes and attacks on a network or application to uncover vulnerabilities. In many ways it's like going to the doctor. You need a checkup, we all do. The frequency of the checkup will vary from person to person depending on health, age, medical history and much more. A pentest can be very similar in the sense that there is a third-party team of hackers or individual hacker performing an assessment on your network or application in order to determine its current security posture.

Topics: Penetration Testing

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity Crossword Puzzle
Posted on Tuesday, August 7th, 2018 by
Our first crossword puzzle has been a success! Due to popular demand, we created another one and increased the difficulty. Good luck!

Topics: Tips & Tricks

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

consideration before outsourcing security mssp
Posted on Tuesday, July 17th, 2018 by
Truth be told, every organization is unique in terms of its cybersecurity needs. Engaging with an MSSP can have tremendous advantages for certain businesses and may not be required for others. Let’s look at 3 key considerations that you should be addressed as part of your decision making: 1. Overall security requirements, 2. Security expertise, 3. Threat monitoring & incident response.

Topics: CISO, Managed Security Services, MSS

Posted on Tuesday, July 10th, 2018 by
To find out how mature you are in terms of cybersecurity, you have to undertake 6 simple steps to define your security posture.

Topics: CISO, Cybersecurity Posture, Security Practices

what's your score
Posted on Tuesday, July 3rd, 2018 by
Test your cybersecurity knowledge. Fill out this crossword puzzle and try to beat our record. Play now!

Topics: Privacy & Security, Tips & Tricks

... 456789101112 ... 18 ...

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now