Hitachi Group Global Network




Middle East and Africa



Bad Rabbit Ransomware: What to Know and How to Prevent It
You are here: Home \ Blog
Bad Rabbit Ransomware
Posted on Friday, October 27th, 2017 by
Who is affected? Learn more about the infection method and impact of Bad Rabbit ransomware and how to prevent it from happening.

Topics: Ransomware, Tips & Tricks

Posted on Thursday, October 26th, 2017 by
One way for businesses to respond to the latest threats is through the services provided by managed security service providers at a fraction of the cost of a similar capability built in-house...

Topics: Managed Security Services, MSS

Protect Your Small Business from Cyber Attacks
Posted on Tuesday, October 24th, 2017 by
Small businesses are prime targets for cyber attacks. Follow these 5 ways to protect your small business from cyber attacks.

Topics: Security Practices

GDPR Compliance
Posted on Tuesday, October 10th, 2017 by
What you need to know about GDPR significant requirements for businesses to implement comprehensive privacy programs including mandatory privacy by design and data protection impact assessments.

Topics: Compliance, Privacy & Security

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

2017 Ransomware Trends and How to Protect Yourself Against the Malware

Topics: Ransomware

NIST compliance
Posted on Monday, September 25th, 2017 by
By December 31, 2017, federal contractors or organizations that serve the federal government will need to meet the 110 individual controls in NIST 800-171 pertaining to the handling of CUI in order to maintain compliance with the Federal Government.

Topics: Compliance, Control Assessment

Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in an APT attack.

Topics: ICS Security

Posted on Tuesday, September 12th, 2017 by
Penetration Tests offer a real time analysis of an organizations security posture by identifying vulnerabilities and a plan to eliminate them in order of criticality

Topics: Penetration Testing, Security Practices

Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets. We’ve gathered today’s most common security control frameworks to simplify the complex world of compliance and and security control assessments.

Topics: CISO, Compliance, Control Assessment, Controls, Managed Security Services, PCI DSS, Penetration Testing, Security Practices

... 5678910111213 ... 18 ...

Latest Webinars | Watch Now


The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now


Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?