NTT DATA Focus

Discover our group initiatives

Global Security Governance: Insights from Kirin Group's Strategic Initiatives and Approaches

Amid global instability, including the COVID-19 pandemic and geopolitical tensions such as Russia's invasion of Ukraine, cyber-attacks are escalating.

December 11, 2024
Global

Cybersecurity

NTT DATA Shines at it-sa Expo&Congress 2024

From October 22nd to October 24th, 2024, NTT DATA proudly participated in the "it-sa Expo&Congress" (it-sa). We were honored to be a part of this global event organized by NürnbergMesse GmbH. As a leading provider of advanced cybersecurity services and solutions, our booth featured interactive solutions developed in partnership with our collaborators, which garnered significant interest from attendees.

December 11, 2024
Global

Cybersecurity

Strengthen your cyber resilience with Managed XDR from NTT DATA

October is Cybersecurity Awareness month, and I want to take this opportunity to share some of my personal observations of the changing cybersecurity landscape along with exciting news from NTT DATA and Palo Alto Networks.

November 5, 2024
Global

Cybersecurity

What is Zero-Knowledge Proof - a hot technology bringing trustworthiness to Web3 privacy?

Recently, "zero-knowledge proof" is attracting attention. In 2019, the World Economic Forum announced zero-knowledge proof as one of the five privacy-enhancing technologies that bring new value to the financial sector.

August 29, 2024
Global

Cybersecurity

Why Knowing Your IAM Maturity Level Is Crucial

This article will provide a comprehensive explanation of Identity & Access Management (IAM), covering from basic concepts to the significance of maturity assessment. Additionally, we will go through IAM services provided by NTT DATA to customers worldwide. This is a must-read for those interested in understanding the complexities of IAM, or for those looking to improve their IAM maturity.

August 29, 2024
Global

Cybersecurity

What is SSVC, a new metric for security vulnerability assessment?

The time from vulnerability information disclosure to its being exploited is getting shorter. Thus, it is necessary to make a prompt and appropriate triage and response. For this purpose, it is effective to use the metric to assess vulnerability correctly. We will introduce SSVC, a new metric that enables us to directly understand countermeasures from the metric.

August 29, 2024
Global

Cybersecurity

What is the foundation for secure use of ChatGPT?

Depending on how you use ChatGPT, you can get answers that are at least as good as experts, and it is expected to be used in various fields. On the other hand, if security measures are not taken, confidential information may be leaked, and other damage may occur. This article mainly introduces security measures when using ChatGPT in an enterprise.

August 27, 2024
Global

Cybersecurity Cloud Data & Intelligence

Key management issues in cloud and the introduction of post-quantum cryptography

In recent years, the demand for autonomous system operation is increasing. To safely use data on the cloud, cryptographic key management is vital, but there are challenges that we need to overcome. We will explain the requirements for key management systems to solve these challenges, introduce the trend of post-quantum cryptography, and points to consider when introducing it.

August 21, 2024
Global

Cybersecurity Cloud Quantum computing

Part two: Improving cyber-attack response capabilities with MISP!

There are many organizations that use IoC (Indicator of Compromise) as a measure against cyber-attacks, which is easy to use among threat intelligence. On the other hand, there are many information sources that distribute IoC, and it is difficult to judge from which information source to acquire IoC. This paper explains the index for evaluating information sources created by NTTDATA-CERT.

August 21, 2024
Global

Cybersecurity

Improving cyber-attack response capabilities with MISP!

With the increase in cyber-attacks, a huge amount of threat intelligence is required for response. It is important to quickly acquire and manage threat intelligence, and to reflect and replace it in security devices. We will introduce how the introduction of MISP (Malware Information Sharing Platform) has improved cyber-attack response capabilities and facilitated information cooperation internally and externally.

August 21, 2024
Global

Cybersecurity

Participation and sponsorship of the 36th Annual FIRST Conference

NTT DATA proudly participated in and sponsored the "36th Annual FIRST Conference (FIRSTCON24)" held from June 9 to June 14, 2024. As a leading provider of advanced cybersecurity services and solutions, we were honored to be a part of this globally recognized event, organized by the Forum of Incident Response and Security Teams, Inc. (FIRST). This report provides an overview of our involvement and the outcomes achieved in FIRSTCON24.

August 16, 2024
Global

Cybersecurity

How to turn DevOps into DevSecOps

IT DEVELOPMENT and IT OPERATIONS are no longer exclusive to IT companies. Many companies are now doing IT DEV and IT OPS as a part of their own business, either by hiring IT engineers directly or by collaborating with IT companies. This article explains DevSecOps, which is becoming an increasingly important concept as system life cycles become shorter.

August 15, 2024
Global

Cybersecurity Application Development & Management