Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Cyberthreat information to be shared between Hitachi and HP

9/10/2015 by

W1siziisijiwmtuvmtavmdkvmdkvmtuvmzcvmjqyl0n5ymvydghyzwf0lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Hitachi has announced that it is to start trialling a new cyberthreat data sharing system. As a way to safeguard itself against emerging threats and new attack methods, the company will share information with Hewlett-Packard Company (HP); by doing so, Hitachi suggests that it will be able to gain access to up-to-date cyber-risk situations and gain a higher accuracy in its analysis of cyber-attacks. This means the company should be able to speed up its response time to cyber-attacks, enhance services related to security, and share information with Computer Security Incident Response Teams (CSIRTs).

Over the past few years there has been a growing risk of cyber-attacks, which have been experienced not only by corporate IT systems but also critical social infrastructure. It is becoming essential to collect as much data as possible to identify the causes of attacks and the threats they hold. Unfortunately only the victims of attacks ever get a full picture of damage and attack methods, and the information gathered by just those affected can be limited in both quantity and quality.

Hitachi currently prevents and defends against cyberthreats by using its Hitachi Incident Response Team (HIRT). This internal group of security experts established the HIRT lab in 2013 and continues to share cyberthreat data with other organisations and firms; meanwhile, HP has developed HP Threat Central, a platform specifically enabled to share security information.

Ted Ross, HP’s director of threat intelligence and security research, stated: “Targeted attacks are becoming more pervasive and the evolving nature of threats continues to be a top security challenge facing organisations around the world. Information sharing is fundamental to staying a step ahead of adversaries, advancing security intelligence and quickly isolating threats to predict threats and protect our most valuable data.”

Shuji Senoo, Hitachi’s senior director of advanced security technology operations in the cloud services division, explained: “Hitachi will share cyberthreat data with CSIRTs of other companies and security-related organisations. In this way, the company will contribute to more sophisticated society-wide cybersecurity capabilities by enhancing methods to detect and prevent cyber-attacks while minimising its impacts on organisational activities.”

As a result of the partnership, Hitachi will now actively utilise information gained from its trial with HP. Information will be shared with CSIRTs in Japan and other nations. Such an allegiance is likely to become more common in the coming years as businesses continue to battle against cyber-attacks and potential threats.

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...