NTT DATA Focus

Discover our group initiatives

Pick Up

Before it is taken away! It's time to review your domain management method

A domain name is a critical business asset-and because of its value, it is constantly a target for attackers. Despite this, many companies remain insufficiently aware of the importance of domain management and the risks associated with it. How can organizations accurately identify domain related threats and implement effective protections? In this article, we explain key methods for managing domain risks and introduce practical countermeasures, including examples of our own initiatives.

April 1, 2026
Global

Cybersecurity

Why DMARC? Protecting Customers with Effective Implementation and Operation of Email Security

Email remains an essential communication tool in modern business. However, the damage caused by increasingly sophisticated email based attacks continues to grow. To protect organizations and their customers from threats such as phishing and email spoofing, strengthening email security has become an urgent priority.

March 25, 2026
Global

Cybersecurity

"Is your factory/building really safe?"

In recent years, cyberattacks targeting operational technology (OT) systems in factories, buildings, and other critical facilities have increased rapidly. OT environments directly control equipment and machinery, meaning that successful attacks can lead to severe consequences such as production stoppages, equipment damage, and risks to human life.

March 25, 2026
Global

Cybersecurity

Trust at the speed of AI: Building a cybersecurity strategy for AI

Enterprise digitalization arrived steadily but relatively quietly. There was no single moment of disruption. Without much fanfare, it embedded itself into every corner of the business.

March 24, 2026
Global

Cybersecurity

Uncover Hidden Threats! Practical use case of Threat Hunting

Cyberattacks continue to evolve, and the number of attacks that cannot be detected by traditional security measures alone is increasing. In addition, the widespread use of cloud services and the expansion of remote work have made corporate IT environments more complex, raising the risk of attacker intrusions.

March 19, 2026
Global

Cybersecurity

The first step to strengthening security! Rethink your organization's current state with a maturity model

How should security organizations such as SOCs and CSIRTs evaluate their current capabilities and determine how to improve? In this article, we explain the basic concept of the maturity index and introduce three widely used frameworks that help assess the maturity of security organizations with diverse roles. We also outline the characteristics of each framework and key points to consider when applying them.

March 19, 2026
Global

Cybersecurity

The New Normal for Generative AI: What is the "Guardrail" that Protects Companies from AI Security Risks

As the use of generative AI continues to expand rapidly across companies, new security risks are emerging-such as employees using shadow AI tools and the unintentional leakage of confidential information through prompts. Traditional human centric approaches, including policy creation and employee training, are no longer sufficient to effectively mitigate these risks. To ensure safe adoption, organizations must implement technical controls capable of monitoring and managing generative AI usage in real time. In this article, we introduce the concept of AI guardrails, explain how they work, and highlight key considerations for implementing them to support the secure and responsible use of generative AI within enterprises.

March 17, 2026
Global

Cybersecurity

Information leak? Pitfalls of using generative AI in companies

In recent years, many companies have adopted generative AI to enhance operational efficiency and productivity. Its effectiveness has been recognized in areas such as document creation, information organization, and customer support, and its applications continue to expand rapidly. However, as the use of generative AI grows, new security risks have emerged - such as the accidental input of confidential information and unintentional data leakage. Given these challenges, it is essential for organizations to understand these risks and establish clear countermeasures to ensure the safe and appropriate use of generative AI. This article outlines the key security risks companies face when using generative AI and presents fundamental strategies to mitigate them.

March 16, 2026
Global

Cybersecurity

Key points of security risk countermeasures in the use of generative AI

With the rapid adoption of generative AI, many companies are exploring how to integrate it into their operations. At the same time, new risks have emerged—such as unintentional information leakage through AI prompts and business disruptions caused by AI generated misinformation. Because these risks span a wide range of areas, it is essential for organizations to understand both the threats and the appropriate countermeasures to ensure the safe use of generative AI. This paper explains the specific risks faced by users and presents effective mitigation strategies from both technical (system) and governance perspectives.

March 9, 2026
Global

Cybersecurity

Authentication technology "Passkey" attracting attention phishing attack resistance

In recent years, one of the most significant security threats facing online services has been the misuse of personal information and the financial losses caused by phishing attacks targeting end users. For example, in the Top 10 Information Security Threats published annually by the Information-Technology Promotion Agency (IPA) in Japan, the exploitation of personal information through phishing has consistently appeared every year since 2019.

March 6, 2026
Global

Cybersecurity

Cybersecurity Frontline ~Latest Trends in 2024 and NTT DATA's Advanced Initiatives~

With the emergence of new attack techniques that leverage artificial intelligence (AI), cybersecurity threats facing companies and government agencies are becoming increasingly severe. Cyberattacks have grown more sophisticated than ever, targeting not only large enterprises and government organizations but also small and medium sized businesses and institutions that operate critical internal infrastructure.

March 5, 2026
Global

Cybersecurity

The new rules of trust: Governance, risk and compliance in the AI era

If there ever was a moment when governance, risk and compliance (GRC) deserved a seat at the strategy table, it is now. Cloud transformation, AI adoption, expanding digital ecosystems and a wave of global regulations have converged to create an ever more demanding business landscape.

February 3, 2026
Global

Cybersecurity