Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Security Practices
You are here: Home \ Security Practices
Posted on Tuesday, July 2nd, 2019 by
Industries and cities across the globe are turning to smart technologies to solve complex problems. In doing so, they generate and analyze subject data to feed intelligent applications. This brings enormous responsibility in ensuring the ethical use of these data. In applying a privacy-enhanced and ethical approach when building technological solutions, we must start by embracing the idea of Ethical by Design. Learn more about data privacy and ethics in our latest blog post.

Topics: Artificial Intelligence, Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, June 18th, 2019 by
If you owned gold bars, would you keep them safe? Of course you would. Gold is valuable but so is personal data. It may not seem on the surface to have the same value as gold, but to our customers, it can represent their very identity. We must now ask ourselves: what does Canadian data privacy legislation do to help us protect our data? Data privacy has become incredibly important for businesses.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, June 4th, 2019 by
Do you have what it takes to crack this puzzle? This time, we challenge you to test your knowledge about the various data security regulations that organizations are facing these days. Good luck!

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 28th, 2019 by
Organizations that fall under the remit of retail and manufacturing have to often deal with both general data protection regulations and industry-specific ones, such as financial transaction security. This is the third article in our series on data security and protection regulations in different industries, this time about retail and manufacturing. Whilst the first two posts on the finance sector and healthcare looked at very specific regulations, this sector has a wider scope.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 21st, 2019 by
Healthcare, like other industry sectors, has become part of the new wave of digital transformation. The industry is heavily dependent on digital data, including highly sensitive patient data. Therefore, healthcare has been the target for cybercrime for many years; health information is a valuable commodity which is not lost on cybercriminals. In this second post about data security regulations, we are turning our attention to data security regulations in the healthcare industry, including HIPAA and HITECH.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 14th, 2019 by
Our economic landscape is filled with a mosaic of specific data security rules and regulations across multiple industries such as finance, healthcare and retail. In this blog article, we provide an overview of some of the most commonly-cited data security regulations for the financial services industry, including GLBA, SOX, PCI DSS, 23 NYCRR 500 and several others.

Topics: Compliance, Cyber Law, Managed Security Services, Privacy & Security, Security Practices

Posted on Tuesday, May 7th, 2019 by
It's been almost a year since GDPR came into effect. What has happened since then? What are the lessons learned? Why is data privacy a business priority? And how can you reevaluate your level of GDPR preparedness? Find out more in our blog article.

Topics: Cyber Law, Privacy & Security, Security Practices, Tips & Tricks

Posted on Tuesday, April 30th, 2019 by
Issued in March 2017, the main objective of 23 NYCRR 500 is to establish better protect consumer data privacy in the financial, banking and insurance industries across the United States. In this first blog article about 23 NYCRR 500, we will outline some key points to help you get a better understanding of the impact of the recent regulation.

Topics: Compliance, Cyber Law, Privacy & Security, Security Practices

Posted on Tuesday, February 19th, 2019 by
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping. Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.

Topics: Compliance, Cyber Law, Cybersecurity Posture, IoT Security, Managed Security Services, Privacy & Security, Security Practices

nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More