NTT DATA Focus

Discover our group initiatives

What is Zero-Knowledge Proof - a hot technology bringing trustworthiness to Web3 privacy?

Recently, "zero-knowledge proof" is attracting attention. In 2019, the World Economic Forum announced zero-knowledge proof as one of the five privacy-enhancing technologies that bring new value to the financial sector.

August 29, 2024
Global

Cybersecurity

Why Knowing Your IAM Maturity Level Is Crucial

This article will provide a comprehensive explanation of Identity & Access Management (IAM), covering from basic concepts to the significance of maturity assessment. Additionally, we will go through IAM services provided by NTT DATA to customers worldwide. This is a must-read for those interested in understanding the complexities of IAM, or for those looking to improve their IAM maturity.

August 29, 2024
Global

Cybersecurity

What is SSVC, a new metric for security vulnerability assessment?

The time from vulnerability information disclosure to its being exploited is getting shorter. Thus, it is necessary to make a prompt and appropriate triage and response. For this purpose, it is effective to use the metric to assess vulnerability correctly. We will introduce SSVC, a new metric that enables us to directly understand countermeasures from the metric.

August 29, 2024
Global

Cybersecurity

What is the foundation for secure use of ChatGPT?

Depending on how you use ChatGPT, you can get answers that are at least as good as experts, and it is expected to be used in various fields. On the other hand, if security measures are not taken, confidential information may be leaked, and other damage may occur. This article mainly introduces security measures when using ChatGPT in an enterprise.

August 27, 2024
Global

Cybersecurity Cloud Data & Intelligence

Key management issues in cloud and the introduction of post-quantum cryptography

In recent years, the demand for autonomous system operation is increasing. To safely use data on the cloud, cryptographic key management is vital, but there are challenges that we need to overcome. We will explain the requirements for key management systems to solve these challenges, introduce the trend of post-quantum cryptography, and points to consider when introducing it.

August 21, 2024
Global

Cybersecurity Cloud Quantum computing

Part two: Improving cyber-attack response capabilities with MISP!

There are many organizations that use IoC (Indicator of Compromise) as a measure against cyber-attacks, which is easy to use among threat intelligence. On the other hand, there are many information sources that distribute IoC, and it is difficult to judge from which information source to acquire IoC. This paper explains the index for evaluating information sources created by NTTDATA-CERT.

August 21, 2024
Global

Cybersecurity

Improving cyber-attack response capabilities with MISP!

With the increase in cyber-attacks, a huge amount of threat intelligence is required for response. It is important to quickly acquire and manage threat intelligence, and to reflect and replace it in security devices. We will introduce how the introduction of MISP (Malware Information Sharing Platform) has improved cyber-attack response capabilities and facilitated information cooperation internally and externally.

August 21, 2024
Global

Cybersecurity

Participation and sponsorship of the 36th Annual FIRST Conference

NTT DATA proudly participated in and sponsored the "36th Annual FIRST Conference (FIRSTCON24)" held from June 9 to June 14, 2024. As a leading provider of advanced cybersecurity services and solutions, we were honored to be a part of this globally recognized event, organized by the Forum of Incident Response and Security Teams, Inc. (FIRST). This report provides an overview of our involvement and the outcomes achieved in FIRSTCON24.

August 16, 2024
Global

Cybersecurity

How to turn DevOps into DevSecOps

IT DEVELOPMENT and IT OPERATIONS are no longer exclusive to IT companies. Many companies are now doing IT DEV and IT OPS as a part of their own business, either by hiring IT engineers directly or by collaborating with IT companies. This article explains DevSecOps, which is becoming an increasingly important concept as system life cycles become shorter.

August 15, 2024
Global

Cybersecurity Application Development & Management

Potential use of Generative AI in risk analysis operations

Risk analysis and countermeasure design are the main tasks in the upstream process related to cybersecurity, and the personnel involved need high skills, and require heavy workload. Regarding the feasibility of generative AI for upstream process, we introduce the results of our verification and the possibility of its use in the future.

August 15, 2024
Global

Cybersecurity Data & Intelligence

Generative AI used in incident response

Generative AI is currently considered for use in various fields, and its application in the field of cybersecurity is no exception. While it is expected to be used for "defense", there is concern that it may also be used for "attacks." This article introduces how generative AI can be used for "defense," especially in the "incident response" phase.

August 15, 2024
Global

Cybersecurity Data & Intelligence

Tips for Co-creating Security Services with Startups

In recent years, open innovation has been emphasized. Co-creation with startups can contribute to solving problems for the company, its customers, and society, and ultimately strengthen the company competitiveness. However, many companies are unsure how to co-create with startups. This article explains the key points of strategy planning, startup research and selection based on the case at NTT DATA.

July 17, 2024
Global

Cybersecurity