Hitachi Group Global Network




Middle East and Africa



Category: Trends & Technologies
You are here: Home \ Trends & Technologies
Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

Posted on Tuesday, March 26th, 2019 by
In this blog article, we will shed a light on the increasingly popular concept of smart cars, give examples for possible smart car security threats and provided recommendations for how to prevent your smart car from being outsmarted.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, IoT Security, Machine Learning, Penetration Testing, Privacy & Security, Trends & Technologies

Posted on Tuesday, February 12th, 2019 by
Today’s Managed Security Service Providers need to leverage a variety of next-generation technologies, not just to stay on top their game but also to offer their customers the best possible protection possible. These technologies include big data analytics, automation, artificial intelligence and machine learning.

Topics: Artificial Intelligence, BIg Data, Digital Transformation, Internet of Things, Machine Learning, Managed Security Services, MSS, Privacy & Security, Trends & Technologies

Smart City Privacy
Posted on Tuesday, January 22nd, 2019 by
As our cities become smarter, is the use of data also smart? Is privacy being driven from the city walls to be replaced only by efficiency and convenience? We're looking at several examples from smart city projects around the world to find out how and if smart city technologies respect modern data privacy concerns.

Topics: Artificial Intelligence, Digital Transformation, Internet of Things, IoT Security, Privacy & Security, Trends & Technologies

Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management, Trends & Technologies

Digital Transformation
Posted on Thursday, January 19th, 2017 by
It is a fact that this new wave of digital transformation has changed how we live our everyday life. We make purchases with our phone, each choice we make on a website is recorded and we measure all our physical activity through wearable technologies and are tracked by GPS. Subsequently, innovation is also changing many of the fundamental ways in which we conduct business including how companies engage and interact with their customers.

Topics: Digital Transformation, Privacy & Security, Trends & Technologies

Do Quantum Computers Mean the End of HTTPS
Posted on Wednesday, July 20th, 2016 by
Why HTTPS might not be as secure as before...

Topics: Cryptography, Trends & Technologies

5 steps to protect against ransomware
Posted on Tuesday, April 19th, 2016 by
Would you or your organization know what to do if your computer were infected with ransomware? Here are 5 steps you can take to avoid getting infected by this malware.

Topics: Cryptography, Ransomware, Security Practices, Tips & Tricks, Trends & Technologies

Posted on Thursday, April 7th, 2016 by
The Internet was not designed with anonymity in mind; in fact, one of the original design goals was accountability. However, anonymity has become a necessary and legitimate aim in many applications (browsing the internet, chatting, sending instant messages etc.). In these applications, encryption alone cannot maintain the anonymity required by users. The main reason for this is the fact that in this case only the communication is encrypted; it is still possible to know the source and destination of the communication.

Topics: Cryptography, Security Practices, Trends & Technologies

Why We Love Semantics in IT Security
Posted on Wednesday, February 24th, 2016 by
Semantics is the study of meaning that is used for understanding human expression through language. It focuses on the relation between signifiers such as words, phrases, signs, and symbols, and what they stand for. In IT security, when we refer to semantics, we usually refer to “Semantic Event Correlation”. You have surely noticed these terms in the company brochures you received by email last week. While scrolling down the PDF, you could not avoid...

Topics: Data Mining, Trends & Technologies

Latest Webinars | Watch Now


The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now