Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Privacy & Security
You are here: Home \ Privacy & Security
Posted on Tuesday, May 7th, 2019 by
It's been almost a year since GDPR came into effect. What has happened since then? What are the lessons learned? Why is data privacy a business priority? And how can you reevaluate your level of GDPR preparedness? Find out more in our blog article.

Topics: Cyber Law, Privacy & Security, Security Practices, Tips & Tricks

Posted on Tuesday, April 30th, 2019 by
Issued in March 2017, the main objective of 23 NYCRR 500 is to establish better protect consumer data privacy in the financial, banking and insurance industries across the United States. In this first blog article about 23 NYCRR 500, we will outline some key points to help you get a better understanding of the impact of the recent regulation.

Topics: Compliance, Cyber Law, Privacy & Security, Security Practices

Darknet Stolen Data
Posted on Tuesday, April 23rd, 2019 by
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail. In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.

Topics: Cybersecurity Platform ArkAngel, Cybersecurity Posture, Darknet Intelligence, Digital Transformation, Managed Security Services, MSS, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment, Vulnerability Management

Posted on Tuesday, April 16th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. Do you know the most commonly-used terms and terminologies when it comes to the darknet? Test your knowledge in our darknet crossword puzzle!

Topics: Cybersecurity Platform ArkAngel, Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, April 9th, 2019 by
The darknet holds a deep pool of stolen data, threat plots, and the tools of cybercrime. This forms a well of intelligence that we can apply to our own threat prevention needs. However, this most hidden part of the wider Internet needs the right tools to explore its murky depths. How does darknet intelligence help us fight cybercrime? How can we leverage the hidden depths of the darknet to gain actionable information?

Topics: Cybersecurity Platform ArkAngel, Digital Transformation, Penetration Testing, Phishing, Privacy & Security, Ransomware, Vulnerability Assessment

Posted on Tuesday, March 26th, 2019 by
In this blog article, we will shed a light on the increasingly popular concept of smart cars, give examples for possible smart car security threats and provided recommendations for how to prevent your smart car from being outsmarted.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, IoT Security, Machine Learning, Penetration Testing, Privacy & Security

Posted on Tuesday, March 19th, 2019 by
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...

Topics: BIg Data, Cloud Security, Cybersecurity Posture, Digital Transformation, Enterprise Security Architecture, Managed Security Services, Office 365 Security, Penetration Testing, Privacy & Security, Vulnerability Assessment

Cybersecurity Crossword Puzzle
Posted on Tuesday, March 12th, 2019 by
Here is our new crossword puzzle for your entertainment, this time about the topic of data privacy! Put your data privacy knowledge to the test and let us know if you'll be able to crack it in less than 3 minutes... Good luck!

Topics: Compliance, Privacy & Security, Tips & Tricks

Posted on Tuesday, March 5th, 2019 by
Similar to what is currently being applied by the European Union via the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) brings to the United States a new set of data privacy rights and compliance obligations. What does this mean for organizations? In short, businesses inside and outside of California may be affected by this new privacy legislation. Business owners, executives and privacy professionals should therefore prepare for January 1, 2020.

Topics: Compliance, Cyber Law, Privacy & Security, Tips & Tricks, Uncategorized

Posted on Tuesday, February 19th, 2019 by
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping. Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.

Topics: Compliance, Cyber Law, Cybersecurity Posture, IoT Security, Managed Security Services, Privacy & Security, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More