Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Uncategorized
You are here: Home \ Uncategorized
Pentest Exploits
Posted on Wednesday, January 2nd, 2019 by
We’ve put together some of today’s most common pentest exploits and offer guidance on how to remediate them effectively to strengthen your organization's cybersecurity posture and better manage your risk. Common pentest exploits include: 1. Password Vulnerabilities, 2. OS and Endpoint Application Vulnerabilities, 3. Misconfiguration Vulnerabilities, 4. ...

Topics: Penetration Testing, Tips & Tricks, Uncategorized, Vulnerability Assessment

Big Data Privacy_Hitachi Systems Security
Posted on Tuesday, December 11th, 2018 by
Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU’s GDPR takes root and other nations follow suit. But not everyone is on board. Who will be the privacy leaders and laggards in the New Year?

Topics: Compliance, Privacy & Security, Uncategorized

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: Control Assessment, Controls, Cybersecurity Platform ArkAngel, Managed Security Services, Uncategorized

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More