Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Digital Transformation
You are here: Home \ Digital Transformation
Deepfakes and Cybercrime
Posted on Thursday, November 14th, 2019 by
How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?  Back in 2018, researchers found 14,698 deepfake videos online. But what is this phenomenon about and how will it affect businesses and individuals in the years to come?

Topics: Artificial Intelligence, Cybersecurity Posture, Digital Transformation, Phishing, Social Engineering, Trends & Technologies, Uncategorized

Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, April 16th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. Do you know the most commonly-used terms and terminologies when it comes to the darknet? Test your knowledge in our darknet crossword puzzle!

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 9th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. This forms a well of intelligence that we can apply to our own threat prevention needs. However, this most hidden part of the wider Internet needs the right tools to explore its murky depths. How does darknet intelligence help us fight cybercrime? How can we leverage the hidden depths of the darknet to gain actionable information?

Topics: Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, March 26th, 2019 by
In this blog article, we will shed a light on the increasingly popular concept of smart cars, give examples for possible smart car security threats and provided recommendations for how to prevent your smart car from being outsmarted.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, IoT Security, Machine Learning, Penetration Testing, Privacy & Security, Trends & Technologies

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Posted on Tuesday, February 12th, 2019 by
Today’s Managed Security Service Providers need to leverage a variety of next-generation technologies, not just to stay on top their game but also to offer their customers the best possible protection possible. These technologies include big data analytics, automation, artificial intelligence and machine learning.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, Machine Learning, Managed Security Services, MSS, Privacy & Security, Trends & Technologies

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Smart City Privacy
Posted on Tuesday, January 22nd, 2019 by
As our cities become smarter, is the use of data also smart? Is privacy being driven from the city walls to be replaced only by efficiency and convenience? We're looking at several examples from smart city projects around the world to find out how and if smart city technologies respect modern data privacy concerns.

Topics: Artificial Intelligence, Digital Transformation, Internet of Things, IoT Security, Privacy & Security, Trends & Technologies

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now