Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Internet of Things
You are here: Home \ Internet of Things
IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

executive insights on IT pros challenges
Posted on Tuesday, October 23rd, 2018 by
Security executives from different industries and backgrounds chat about common challenges for IT professionals. Our executives shared great tips for building a solid cybersecurity pitch to the Board of Directors and the executive management team.

Topics: CISO, Controls, Cybersecurity Posture, Internet of Things, Tips & Tricks

DDoS Attacks
Posted on Tuesday, January 31st, 2017 by
Personal online security is an issue that most users don’t think about too much until something happens. While we like to think that we are safe and sound with our basic antivirus protection, the truth is quite a bit scarier than that. Our devices are under threat of becoming tools for hackers with malicious intent. Distributed Denial of Service (DDoS) attacks, a particularly malicious approach to online crime, uses our devices and the growing army of IoT devices as bots to execute attacks either to harm the owners of the site or to extract a ransom.

Topics: DDoS, Internet of Things

Privacy and Data Challenges in the IoT
Posted on Wednesday, March 16th, 2016 by
From toasters to medical devices, from utility grids to remote controls and from watches to construction equipment, these everyday items that we use to live, work, play and learn are being connected to the World Wide Web (WWW) in an unprecedented phenomenon call the Internet of Things (IoT). This phenomenon raises privacy and data protection challenges that need to be addressed...

Topics: Internet of Things

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More