HIPAA IT Compliance | Main Things You Need to Know

HIPAA IT Compliance Guide: Main Things You Need to Consider

What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]

Acronis Conference IT Security

Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)

A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking IT potential. How to unlock the IT potention of Bulgaria? Read more about Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)[…]

Privacy by Design in practice

Privacy by Design in Practice

The past year saw the acceleration of two already important information security trends: the ever-increasing threat of data breaches  a rising consumer and regulatory oversight on corporate data processing. Indeed, the year was not a good one for privacy – high profile data breaches range from the Marriott Hotels (500 million people), through marketing firm’s Read more about Privacy by Design in Practice[…]

Reasons not to ignore data integrity

3 Reasons Not To Ignore Data Integrity

Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]


Try SentinelDB In Your Heroku Deployment

We are happy to announce that you can now use SentinelDB, our GDPR-compliant datastore, in your Heroku deployments. The SentinelDB addon can be found here. We are keen on providing multiple options for easy integration of SentinelDB and thus ensuring full data protection for cloud applications. If your application is running on Heroku and you Read more about Try SentinelDB In Your Heroku Deployment[…]

Data Breach Prevention: Types

Preventing Various Types of Data Breaches

Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit cards and locations of people at a given time were Read more about Preventing Various Types of Data Breaches[…]


Releasing SentinelDB, the Privacy By Design Database

Data breaches are happening practically every day. Reputations are damaged, customers are unhappy and regulators are more and more demanding. Data protection is no longer just a hassle that the legal department has to handle – it must be an integral part of each software system. That’s why we leveraged our in-depth experience with GDPR Read more about Releasing SentinelDB, the Privacy By Design Database[…]

Compliant Audit Logs

Flexible Log Collection: Configuring The LogSentinel Agent

When audit logs are concerned, there are many ways to generate and collect them. Ideally, audit logs are generated in code, depending on the business logic of each application and sent for secure storage to another service, like SentinelTrails. However, refactoring a system to include dedicated audit log functionality may not be feasible, as there Read more about Flexible Log Collection: Configuring The LogSentinel Agent[…]

How LogSentinel Complements Log Collectors

How LogSentinel Complements Log Collectors

You are likely using a log collector – Graylog, Splunk, Loggly, logstash, logz.io, scylar, CloudWatch logs, etc. And log collectors are absolutely mandatory for any deployment of more than one machine (though they are very useful even in that case). They collect all your logs in one place, allowing you to search, “tail”, define alerts. Read more about How LogSentinel Complements Log Collectors[…]

Bozhidar Bozhanov, CEO of LogSentinel

SentinelDB Is Coming Soon!

We at LogSentinel are striving to deliver high quality products, ensuring a 360-degree compliance integration, improved control over cyber security, and minimizing the risk of data breach. It’s been a busy summer season for everyone from the team – we have consulted companies in relation to GDPR, PCI-DSS, PSD-2 and other standards and regulations concerning information Read more about SentinelDB Is Coming Soon![…]