NTT DATA Focus
Discover our group initiatives
Pick Up
Cloud security explained: Solving misconfigurations, visibility gaps and zero trust challenges
Cloud security is a defining challenge for organizations everywhere. No longer just a technical matter, it has become a boardroom issue that affects survival, resilience and growth.
- October 29, 2025
- Global
Cybersecurity
Cloud security: The cost of getting it wrong and the advantage of getting it right
The cloud: You can't touch it or see it. But almost everyone's on it, whether they know it or not. Your employees are probably using software as a service (SaaS) applications for payroll or financial management, and your customers, without doubt, rely on cloud-hosted services. It's everywhere. But you can't afford to have your head in the clouds when it comes to cloud security.
- October 28, 2025
- Global
Cybersecurity
Cloud security explained: Solving misconfigurations, visibility gaps and zero trust challenges
Cloud security is a defining challenge for organizations everywhere. No longer just a technical matter, it has become a boardroom issue that affects survival, resilience and growth.
- October 29, 2025
- Global
Cybersecurity
READ MORE
Cloud security: The cost of getting it wrong and the advantage of getting it right
The cloud: You can't touch it or see it. But almost everyone's on it, whether they know it or not. Your employees are probably using software as a service (SaaS) applications for payroll or financial management, and your customers, without doubt, rely on cloud-hosted services. It's everywhere. But you can't afford to have your head in the clouds when it comes to cloud security.
- October 28, 2025
- Global
Cybersecurity
READ MORE
Ready, set, AI: How to build a secure network infrastructure for success
CISOs' jobs are not getting any easier. In many organizations, the C-suite is pressing for the rapid adoption of new AI tools, but if the underlying infrastructure is not properly secured to support these solutions, the business will end up exposed to a whole new realm of potential threats.
- October 21, 2025
- Global
Cybersecurity
READ MORE
From laptop to cloud, SASE is the answer to your security woes
Meet José, a sales manager who's always on the road. His calendar is a blur of client engagements and catching up on work in between meetings.
- October 21, 2025
- Global
Cybersecurity
READ MORE
Proactive measures, secure outcomes: Make your organization cyber resilient
When last did you assess your organization's business resilience? Knowing how prepared you are to respond to and recover from various disruptions to your operations is essential when it comes to guaranteeing long-term sustainability.
- June 20, 2025
- Global
Cybersecurity
READ MORE
A CISO's guide to mastering AI risk
AI has elevated cybersecurity from a technological risk into a business risk. Its immense potential for innovation and growth is coupled with new and unforeseen security challenges.
- June 18, 2025
- Global
Cybersecurity
READ MORE
NTT DATA supports Clients operating in different Sectors to address OT Cybersecurity
Companies across diverse market sectors - from Manufacturing to Energy & Utilities, from Chemicals to Infrastructure – are, also due to regulatory pressure, taking steps to strengthen Cybersecurity controls within their OT (Operational Technology) environments. This article outlines the context, details NTT DATA's proposed approach, and provides a few practical examples.
- April 30, 2025
- Global
Cybersecurity
READ MORE
NTT DATA provides its UMDR Customers with CyFirma Cyber Threat Intelligence
In today's rapidly evolving cyber threat landscape, organizations across industries need advanced threat intelligence capabilities to stay ahead of cybercriminals.
- April 15, 2025
- Global
Cybersecurity
READ MORE
Proactive risk management: the secret to securing your AI journey
Advances in machine learning, natural language processing and computing capacity paved the way for the era of AI. Now, as the technology keeps rapidly evolving, it is changing the way we work - with the potential to revolutionize entire industries.
- April 9, 2025
- Global
Cybersecurity
READ MORE
Ensuring AI Safety: Comprehensive Model Risk Assessment for Generative AI Systems
With the rapid spread of generative AI, the associated risks are attracting attention, leading to the establishment of regulations and guidelines in various countries around the world. This article provides an overview of the increasingly important risk management and an example of model risk assessment using "Lens for LLMs" by Citadel AI, which specializes in improving AI reliability. In this evaluation, we assessed an in-house information retrieval system using generative AI in actual operation with an attack dataset and use case driven dataset. The results confirmed that the tool can be effectively used in the risk assessment of AI models. We recommend that not only engineers and managers involved in AI development and deployment but also those interested in the risk management of generative AI read this article. This article is translated based on our article in Japanese, and some resources and datasets are only available in Japanese.
- April 1, 2025
- Global
Cybersecurity Data & Artificial Intelligence
READ MORE
What Key Management Services Ensure Data Sovereignty in the Sovereign Cloud?
The sovereign cloud has been attracting worldwide attention since 2021. There are three sovereignties required in the sovereign cloud: data sovereignty, system sovereignty, and operation sovereignty. Key management services are an essential technical element to realize data sovereignty.
- March 31, 2025
- Global
Cybersecurity Cloud
READ MORE
Beyond Backups: Unleashing Powerful Strategies for Ultimate Cyber Resilience
Businesses are increasingly threatened by ransomware, making countermeasures essential. In this article, we will focus on cyber recovery strategies based on the NIST Cybersecurity Framework, considering the current state of ransomware. Additionally, we will explain the role of backups and propose effective countermeasures.
- March 28, 2025
- Global
Cybersecurity
READ MORE