Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cloud Security
You are here: Home \ Cloud Security
Posted on Thursday, September 10th, 2020 by
Munich, Germany, and Montreal, Quebec, Canada – August 31, 2020 – Akarion and Hitachi Systems Security (HISYS-SEC) have reached a mutual agreement to bring their business vision, their know-how and their expertise together. Akarion is a German and Austrian software developer for professional compliance management and verifiable tamper-proof data storage. The objective of this collaboration...

Topics: Akarion, Akarion Compliance Cloud, CISO, CISOaaS, Cloud Security, Compliance, Data Protection Operations Center, DPOaaS, DPOC, Internet of Things, IoT Security, Managed Security Services, MSS, Operational Technology, OT, Privacy & Security

Posted on Tuesday, May 12th, 2020 by
Assessing data privacy risks when migrating to the Cloud remains a complex challenge. In a previous post, we looked at the impact of cloud migration from a cybersecurity perspective. That article explored the acceleration of Cloud Computing used to manage the increase in home working requirements due to COVID-19. But security is not the only...

Topics: Canada Privacy Act, Cloud Security, COVID-19, Data Protection Impact Assessment, DPIA, GDPR, PIA, PIPEDA, Privacy & Security, Privacy Impact Assessment, Uncategorized

Posted on Friday, May 1st, 2020 by
In response to the COVID-19 pandemic businesses the world over are accelerating their cloud migration to meet demand. As we move out of our corporate buildings and work from home offices, the need for online meetings and remote access to corporate resources takes on new meaning. When Cloud computing first smashed the corporate perimeter wall,...

Topics: Cloud Security, COVID-19, Cybersecurity Posture, Response Planning, Risk management, wfh, Working from home

Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

Posted on Thursday, December 12th, 2019 by
As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and also found areas of concern around security.

Topics: Cloud Security, Cybersecurity Posture, Darknet Intelligence, DDoS, Vulnerability Assessment

Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

Posted on Tuesday, August 27th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Cloud Security, Compliance, Cybersecurity Posture, Managed Security Services, MSS, Risk management, Security Operations Center, Threat Risk Assessments

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Posted on Tuesday, February 26th, 2019 by
In this blog article, we outline what cloud security is and how cloud migration enables executives and business owners. Learn more about the difference between cloud security and traditional IT security, and find out why it is important to secure your cloud environment before, during and after cloud migration.

Topics: Cloud Security, Managed Security Services, Office 365 Security

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now