Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Trends & Technologies
You are here: Home \ Trends & Technologies \ Page 2
Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management, Trends & Technologies

Digital Transformation
Posted on Thursday, January 19th, 2017 by
It is a fact that this new wave of digital transformation has changed how we live our everyday life. We make purchases with our phone, each choice we make on a website is recorded and we measure all our physical activity through wearable technologies and are tracked by GPS. Subsequently, innovation is also changing many of the fundamental ways in which we conduct business including how companies engage and interact with their customers.

Topics: Digital Transformation, Privacy & Security, Trends & Technologies

Do Quantum Computers Mean the End of HTTPS
Posted on Wednesday, July 20th, 2016 by
Why HTTPS might not be as secure as before...

Topics: Cryptography, Trends & Technologies

5 steps to protect against ransomware
Posted on Tuesday, April 19th, 2016 by
Would you or your organization know what to do if your computer were infected with ransomware? Here are 5 steps you can take to avoid getting infected by this malware.

Topics: Cryptography, Ransomware, Security Practices, Tips & Tricks, Trends & Technologies

Posted on Thursday, April 7th, 2016 by
The Internet was not designed with anonymity in mind; in fact, one of the original design goals was accountability. However, anonymity has become a necessary and legitimate aim in many applications (browsing the internet, chatting, sending instant messages etc.). In these applications, encryption alone cannot maintain the anonymity required by users. The main reason for this is the fact that in this case only the communication is encrypted; it is still possible to know the source and destination of the communication.

Topics: Cryptography, Security Practices, Trends & Technologies

Why We Love Semantics in IT Security
Posted on Wednesday, February 24th, 2016 by
Semantics is the study of meaning that is used for understanding human expression through language. It focuses on the relation between signifiers such as words, phrases, signs, and symbols, and what they stand for. In IT security, when we refer to semantics, we usually refer to “Semantic Event Correlation”. You have surely noticed these terms in the company brochures you received by email last week. While scrolling down the PDF, you could not avoid...

Topics: Data Mining, Trends & Technologies

5 things you must know about https encryption
Posted on Tuesday, December 15th, 2015 by
after latest publication that proves it is less secure than widely believed.Have you ever made a transaction on your bank’s website? Do you feel 100% secure when using an HTTPS–encrypted connection? Well, you shouldn’t. A recent publication proves how the encryption behind HTTPS may fail in practice.

Topics: Cryptography, Trends & Technologies

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now