Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cybersecurity Posture
You are here: Home \ Cybersecurity Posture
Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Platform ArkAngel, Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Posted on Tuesday, February 19th, 2019 by
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping. Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.

Topics: Compliance, Cyber Law, Cybersecurity Posture, IoT Security, Managed Security Services, Privacy & Security, Security Practices

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

cybersecurity project management best practices
Posted on Tuesday, October 30th, 2018 by
Are you struggling with managing several cybersecurity projects at the same time? Would you like some guidance when selecting the “right” cybersecurity projects for your business context? Do you have a feeling that you could manage them more effectively, for your own sake and for the sake of your organization? If you’ve answered yes to any of these questions, we’ve compiled several best practices that can help you manage your cybersecurity projects more effectively.

Topics: Cybersecurity Posture, Security Practices, Tips & Tricks

executive insights on IT pros challenges
Posted on Tuesday, October 23rd, 2018 by
Security executives from different industries and backgrounds chat about common challenges for IT professionals. Our executives shared great tips for building a solid cybersecurity pitch to the Board of Directors and the executive management team.

Topics: CISO, Controls, Cybersecurity Posture, Internet of Things, Tips & Tricks

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More