Database Security and CCPA Compliance

California Consumer Privacy Act (CCPA) is the new privacy law in California that affects a lot of organizations due to its extraterritorial effect. We have already covered CCPA with a high level overview, covering what is it about, who is bounded to comply with it, what are the penalties and what technical safeguards need are Read more about Database Security and CCPA Compliance[…]


Blockchain and Open Data – LogSentinel Brings More Transparency to Government Audit Trail

Bulgarian e-government’s main data exchange component is storing its audit trail in LogSentinel’s SentinelTrails solution since June last year, as LogSentinel donated it to the state e-government agency. We have recently taken the solution a step further and introduced an open data functionality which makes the audit trail transparent. Open data is the concept that Read more about Blockchain and Open Data – LogSentinel Brings More Transparency to Government Audit Trail[…]


NIST: Digital Identity Requires Secure Audit Trail

Digital Identity is a hot topic and is applicable to a wide range of scenarios. Virtually any organization has some form of digital identity in order to authenticate its employees, and some organizations, like banks and governments, have been identity providers to millions of people for a while now. Two years ago, the US National Read more about NIST: Digital Identity Requires Secure Audit Trail[…]

Protecting documents on blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document. Indeed, document fraud is often performed in such a trivial Read more about Protecting Documents Against Fraud and Manipulation With Blockchain[…]

Facebook Plugins Compliance

Facebook Social Plugins and GDPR: The Court of Justice Ruling

This week The Court of Justice of the European Union ruled that websites are liable for Facebook’s tracking activities. This is an important decision that clarifies one of the most important outstanding GDPR issues – whether the consent you’ve given to Facebook exempts website owners from asking for consent. What is the Facebook like button? Read more about Facebook Social Plugins and GDPR: The Court of Justice Ruling[…]

Digital Transformation Happens Too Fast to Be Secure

Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that has very little technical complexity and a much higher human-and-process Read more about Digital Transformation Happens Too Fast to Be Secure[…]

Scanning for logs security

Scanning for Logs to Be Secured by SentinelTrails

Audit logs are a core component for the security of every system – without them there’s no visibility of who did what and for what purpose. There are audits, there are forensic investigations after security incidents, there’s compliance – all of that is impossible without a proper audit log. Existing systems have many and different Read more about Scanning for Logs to Be Secured by SentinelTrails[…]


Technology-Driven Compliance

“Compliance” may sound boring and useless – consultants and lawyers are telling you how you should do things and then go around with checklists to see if everything fits a predefined vision of how a certain business should operate. And there are all sorts of compliance requirements – from regulations (GDPR, PSD2, AML, Regulation (EU) Read more about Technology-Driven Compliance[…]

Privileged access management solutions

Protecting On-Premise Audit Trail

Many large organizations prefer to have their audit trail stored within their own infrastructure. Due to their structure and policies they are reluctant to use cloud services. Using a cloud service has the additional benefit of responsibility segregation – your sysadmins may not have the right to delete logs from the cloud provider infrastructure. Having Read more about Protecting On-Premise Audit Trail[…]

IAM and blockchain usecases for enterprises

Blockchain Use-Cases for IAM

Identity and Access Management (IAM) is core to many enterprise architectures. Centralizing the authentication is mandatory once you have more than a few systems, and IAM providers fill that requirement nicely. On first thought it might seem blockchain has nothing to do with IAM. But that would not be entirely correct. There are two aspects Read more about Blockchain Use-Cases for IAM[…]