Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Dragonfly 2.0 Targets Energy Sector Gaining Access to SCADA Systems
You are here: Home \ Blog
Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in an APT attack.

Topics: ICS Security

Posted on Tuesday, September 12th, 2017 by
Penetration Tests offer a real time analysis of an organizations security posture by identifying vulnerabilities and a plan to eliminate them in order of criticality

Topics: Penetration Testing, Security Practices

Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets. We’ve gathered today’s most common security control frameworks to simplify the complex world of compliance and and security control assessments.

Topics: CISO, Compliance, Control Assessment, Controls, Managed Security Services, PCI DSS, Penetration Testing, Security Practices

Penetration Testing is a Critical Component of PCI Compliance
Posted on Tuesday, August 29th, 2017 by
For any business that handles credit card data, penetration testing has been a requirement since 2013. See how a pentest can help your organization become PCI compliant.

Topics: Compliance, PCI DSS, Penetration Testing

Incident Response
Posted on Tuesday, August 22nd, 2017 by
Over 80% of small and midsized organizations reported suffering at least one cyberattack in the last 12 months, with an average cost of nearly $1 million to restore servers, databases, other systems and data to return to normal business operation after a successful attack. The results of these attacks are staggering: 60% of small companies that suffer a cyberattack are out of business within six months of the attack as suggested by the National Cyber Security Alliance. With such high costs associated with significant attacks, organizations must be prepared to detect and respond to attackers if they are to limit damage and subsequently reduce costs to maintain their business.

Topics: Incident Response, Security Practices

Eliminating Security Gaps with Vulnerability Assessments
Posted on Tuesday, August 15th, 2017 by
Want to eliminate the security gaps in your IT infrastructure? Your first stop should be vulnerability assessments.

Topics: Vulnerability Assessment

Weakness on Warning Road Sign
Posted on Tuesday, August 8th, 2017 by
Is your business ready for a cyber attack? The cyber security threat landscape is clearly more dangerous now than any time in history. While, historically, wars have been fought in the air, on land and on the seas, it now appears that the next war will be fought (or will begin) in cyber space. What are the next cyber threats to look out for and when will Executives take notice?

Topics: CISO, DDoS, Digital Transformation, Penetration Testing, Phishing, Ransomware, Vulnerability Assessment

jigsaw puzzle
Posted on Tuesday, August 1st, 2017 by
How to do a Penetration Test in 5 steps.

Topics: Penetration Testing

2017 Trends
Posted on Tuesday, July 25th, 2017 by
Recent trends in cybersecurity attacks: threat actors involved, tactics used, and the industries targeted. The intent of this analysis of cybersecurity incident information can hopefully help organizations improve threat response time, improve cybersecurity defenses, and allocate cybersecurity resources more effectively.

Topics: DDoS, ICS Security, Phishing, Privacy & Security, Ransomware, Security Practices

How Banks Avoided the WannaCry Cyberattacks
Posted on Tuesday, July 18th, 2017 by
The WannaCry attack started in May of 2017, and within one day it was reported to have affected more than 230,000 devices in over 150 different countries. It hit major hospitals, car manufacturers, and even large telecommunications companies, yet one industry seemed to escape largely unscathed -- banking. While banks have been among the most popular targets for cyberattacks in the past, it seems this is at least one clear instance where the banks have benefited from adopting and evolving better cybersecurity practices and controls. Let’s take a closer look at what types of practices enabled banks to avoid the WannaCry ransomware epidemic.

Topics: Control Assessment, Ransomware, Security Practices

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More