Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Why You Should Audit Office 365 Logs for Security Purposes
You are here: Home \ Blog
Cloud Security
Posted on Wednesday, January 24th, 2018 by
Monitoring Office 365 logs offers a variety of benefits for organizations, including increased security maturity or enhanced detection capabilities, which are traditionally part of Data Loss Prevention (DLP) solutions. By monitoring and analyzing Office 365 security logs in a structured way...

Topics: Cloud Security, Cybersecurity Platform ArkAngel, Office 365 Security

Cybersecurity Talent Shortage
Posted on Tuesday, January 2nd, 2018 by
We currently experience a shortage between 1 million and 1.8 million qualified people in the physical and cyber security industry. Today’s CISOs struggle between choosing to build their own IT security dream teams or outsourcing their security to a trusted security service provider. Now the question is, if we put 1 million people in a college and train them for 4-5 years every year for 20 years, would there be such a talent shortage? Did we miss the window to get that done?

Topics: CISO, Penetration Testing, Risk management

ATM
Posted on Wednesday, December 27th, 2017 by
Securing ATMs and other payment channels is no longer a choice but a necessity to avoid serious financial and reputational damage.

Topics: Managed Security Services, MSS, SIEM

GDPR - FAQ
Posted on Tuesday, December 19th, 2017 by
The GDPR came into effect on May 25, 2018 and has been raising numerous questions among organizations that handle data in Europe. We gathered the questions and answers from our customers: 1. Are Organizations Ready for GDPR Compliance? 2. Backup and Right to Be Forgotten 3. GDPR Challenges 4. Cloud Partners and GDPR Compliance 5. GDPR Penalties 6. GDPR 72 Hour Breach Notification 7. Data Portability

Topics: Compliance, Security Practices

Insider threat
Posted on Monday, December 18th, 2017 by

Topics: Managed Security Services, Security Practices, Tips & Tricks

Why Organizations Aren't Using Cybersecurity Frameworks
Posted on Thursday, December 14th, 2017 by
Why implementing a cybersecurity framework is important? How to use CIS top 20 controls to monitor your risk?

Topics: Control Assessment, Managed Security Services, Risk management

Posted on Wednesday, December 6th, 2017 by
How Uber breach impacted 57 million customer records, and how to prevent it from happening to your business. Here are 5 defensive tactics that would have been effective in preventing Uber’s loss of customer data.

Topics: Cloud Security, Compliance, Control Assessment, Security Practices, Threat Risk Assessments

5 Ways an MSSP Can Save You Money
Posted on Thursday, November 16th, 2017 by
Understanding the cost savings an MSSP (Managed Security Service Provider) provides is critical for companies in our increasingly digital age.

Topics: Managed Security Services, MSS

benefits of managed security service provider
Posted on Wednesday, November 8th, 2017 by
Executives have become overwhelmed with the threat of a breach, compliance, exploding security budgets and frankly, not understanding what information security really is and how it is best managed. A solution that organizations are increasingly touting is partnering with a managed security services provider (MSSP) to empower their security organizations with the people, processes and technology to secure their critical assets and data.

Topics: Managed Security Services, MSS

data breach
Posted on Tuesday, October 31st, 2017 by
Third-party vendors with lax security can pose significant risks to your network and data. Here are the data breach risks and how to reduce them.

Topics: Compliance, Managed Security Services, Security Practices

... 456789101112 ... 18 ...

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More