NTT DATA Focus

Discover our group initiatives

NTT DATA supports Clients operating in different Sectors to address OT Cybersecurity

Companies across diverse market sectors - from Manufacturing to Energy & Utilities, from Chemicals to Infrastructure – are, also due to regulatory pressure, taking steps to strengthen Cybersecurity controls within their OT (Operational Technology) environments. This article outlines the context, details NTT DATA's proposed approach, and provides a few practical examples.

April 30, 2025
Global

Cybersecurity

NTT DATA provides its UMDR Customers with CyFirma Cyber Threat Intelligence

In today's rapidly evolving cyber threat landscape, organizations across industries need advanced threat intelligence capabilities to stay ahead of cybercriminals.

April 15, 2025
Global

Cybersecurity

Proactive risk management: the secret to securing your AI journey

Advances in machine learning, natural language processing and computing capacity paved the way for the era of AI. Now, as the technology keeps rapidly evolving, it is changing the way we work - with the potential to revolutionize entire industries.

April 9, 2025
Global

Cybersecurity

Ensuring AI Safety: Comprehensive Model Risk Assessment for Generative AI Systems

With the rapid spread of generative AI, the associated risks are attracting attention, leading to the establishment of regulations and guidelines in various countries around the world. This article provides an overview of the increasingly important risk management and an example of model risk assessment using "Lens for LLMs" by Citadel AI, which specializes in improving AI reliability. In this evaluation, we assessed an in-house information retrieval system using generative AI in actual operation with an attack dataset and use case driven dataset. The results confirmed that the tool can be effectively used in the risk assessment of AI models. We recommend that not only engineers and managers involved in AI development and deployment but also those interested in the risk management of generative AI read this article. This article is translated based on our article in Japanese, and some resources and datasets are only available in Japanese.

April 1, 2025
Global

Cybersecurity Data & Intelligence

What Key Management Services Ensure Data Sovereignty in the Sovereign Cloud?

The sovereign cloud has been attracting worldwide attention since 2021. There are three sovereignties required in the sovereign cloud: data sovereignty, system sovereignty, and operation sovereignty. Key management services are an essential technical element to realize data sovereignty.

March 31, 2025
Global

Cybersecurity Cloud

Beyond Backups: Unleashing Powerful Strategies for Ultimate Cyber Resilience

Businesses are increasingly threatened by ransomware, making countermeasures essential. In this article, we will focus on cyber recovery strategies based on the NIST Cybersecurity Framework, considering the current state of ransomware. Additionally, we will explain the role of backups and propose effective countermeasures.

March 28, 2025
Global

Cybersecurity

What is CNAPP? Security measures for the increasingly complex public cloud

With the rise in public cloud usage, incidents such as information leakage due to misconfiguration are increasing year by year. This article explores the Cloud Native Application Protection Platform (CNAPP), which has gained attention as a crucial security measure for public cloud environments. It delves into specific security challenges associated with public cloud usage, outlines the security functions designed to address these challenges, and provides key points for introducing CNAPP. This article is highly recommended for those facing security issues in public cloud environments.

March 26, 2025
Global

Cybersecurity Cloud

The Growing Importance of Digital Identity and NTT DATA's Efforts

Have you ever heard of digital identity? Some people associate it with keywords such as authentication and identity management. At NTT DATA, we view digital identity as a crucial element at the heart of enterprise cybersecurity. This perspective has enabled us to resolve various customer issues effectively. In this article, we introduce a part of our methodology.

March 19, 2025
Global

Cybersecurity

What is Multi-Cloud Encryption Key Monitoring to Improve Crypto Agility?

Cloud computing has become an indispensable part of business operations, with the "multi-cloud" approach gaining popularity to optimize usage environments.

March 19, 2025
Global

Cybersecurity Cloud

Cybersecurity Frontiers: Cyber Attacks and Emerging Trends in AI Generation

Cybersecurity threats to companies and government organizations have become increasingly serious, with new methods exploiting AI being developed. The nature of these attacks has grown more sophisticated, targeting not only large companies and governments but also small- and medium-sized enterprises and organizations responsible for internal infrastructure. What information security measures should companies take now? In this article, Yui Arai, an executive security analyst at NTT DATA, and Hiroaki Kamoda, a security and network division manager and cybersecurity countermeasure specialist at the Ministry of Economy, Trade and Industry, summarize the trends and damage from cyberattacks in 2024. They explain the latest trends in cyberattacks as AI evolves and introduce NTT DATA's cybersecurity initiatives and customer support cases

March 17, 2025
Global

Cybersecurity Innovation

The future of security: how firm are your foundations?

Imagine a future where your security is an invisible, adaptive force that's always one step ahead. This describes the transformative potential of "accelerated security fusion", an emerging business strategy identified as a key theme in the NTT DATA Technology Foresight 2025 report. Published annually, the report acts as a compass, pointing to the latest technological trends researched by NTT DATA.

March 10, 2025
Global

Cybersecurity

Visualizing an Internal System Environment that Was a Black Box

In recent years, information leakage countermeasures have become increasingly important. However, there are many cases where logs necessary for analysis are insufficient or not properly analyzed, leading to missed signs. This article introduces an example of NTT DATA supporting countermeasures to detect the leakage of sensitive information from a customer environment. NTT DATA introduced SIEM/UEBA (Security Information and Event Management and User/Entity Behavior Analytics) to consider countermeasures against advanced cyber-attacks. They supported the construction of an environment capable of detecting information leakage and the removal of sensitive information by providing a comprehensive response from requirement definition to operation.

March 3, 2025
Global

Cybersecurity