Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cloud Security
You are here: Home \ Cloud Security
Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Posted on Tuesday, February 26th, 2019 by
In this blog article, we outline what cloud security is and how cloud migration enables executives and business owners. Learn more about the difference between cloud security and traditional IT security, and find out why it is important to secure your cloud environment before, during and after cloud migration.

Topics: Cloud Security, Managed Security Services, Office 365 Security

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

How to secure the IoT environment
Posted on Tuesday, January 15th, 2019 by
We've developed our top 10 tips for businesses to secure their Internet of Things (IoT) environment and devices. 1. Robust Authentication, 2. Encryption and PKI, 3. Security Logging, 4. ...

Topics: Cloud Security, Internet of Things, IoT Security

Cloud Security
Posted on Wednesday, January 24th, 2018 by
Monitoring Office 365 logs offers a variety of benefits for organizations, including increased security maturity or enhanced detection capabilities, which are traditionally part of Data Loss Prevention (DLP) solutions. By monitoring and analyzing Office 365 security logs in a structured way...

Topics: Cloud Security, Cybersecurity Platform ArkAngel, Office 365 Security

Posted on Wednesday, December 6th, 2017 by
How Uber breach impacted 57 million customer records, and how to prevent it from happening to your business. Here are 5 defensive tactics that would have been effective in preventing Uber’s loss of customer data.

Topics: Cloud Security, Compliance, Control Assessment, Security Practices, Threat Risk Assessments

Cloud Security
Posted on Tuesday, June 13th, 2017 by
How to face the new cloud security challenges?

Topics: Cloud Security

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More