Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cloud Security
You are here: Home \ Cloud Security
Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

Posted on Tuesday, August 27th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Cloud Security, Compliance, Cybersecurity Posture, Managed Security Services, MSS, Risk management, Security Operations Center, Threat Risk Assessments

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Posted on Tuesday, February 26th, 2019 by
In this blog article, we outline what cloud security is and how cloud migration enables executives and business owners. Learn more about the difference between cloud security and traditional IT security, and find out why it is important to secure your cloud environment before, during and after cloud migration.

Topics: Cloud Security, Managed Security Services, Office 365 Security

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

How to secure the IoT environment
Posted on Tuesday, January 15th, 2019 by
We've developed our top 10 tips for businesses to secure their Internet of Things (IoT) environment and devices. 1. Robust Authentication, 2. Encryption and PKI, 3. Security Logging, 4. ...

Topics: Cloud Security, Internet of Things, IoT Security

Cloud Security
Posted on Wednesday, January 24th, 2018 by
Monitoring Office 365 logs offers a variety of benefits for organizations, including increased security maturity or enhanced detection capabilities, which are traditionally part of Data Loss Prevention (DLP) solutions. By monitoring and analyzing Office 365 security logs in a structured way...

Topics: Cloud Security, Office 365 Security

Posted on Wednesday, December 6th, 2017 by
How Uber breach impacted 57 million customer records, and how to prevent it from happening to your business. Here are 5 defensive tactics that would have been effective in preventing Uber’s loss of customer data.

Topics: Cloud Security, Compliance, Control Assessment, Security Practices, Threat Risk Assessments

Cloud Security
Posted on Tuesday, June 13th, 2017 by
How to face the new cloud security challenges?

Topics: Cloud Security

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now