As the end of the year approaches, some important business decisions need to be taken – strategies must be mapped out, budgets are to be requested, decided, and allocated. This is why we have decided to organize a webinar on the 29th of October at… Read More »Free Webinar: What to add to your cybersecurity roadmap for 2021?
Cyber Security Articles
In this category, we will cover different articles related to how to protect your business from cybercrime, data breaches, and personal data hacking.
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit… Read More »Preventing Various Types of Data Breaches
Software-as-a-service is the norm now. All organizations, even the most conservative ones, are using some form of SaaS – be it for storage, email, customer management, marketing, or even low-code. But security is always a concern with SaaS, so vendors need to take extra care… Read More »Five Mandatory Security Features for SaaS
As the IBM 2020 Cost of a Data Breach report outlines, the year has not been a good one for privacy, so far – with $3.86 million global average cost of a data breach, and the healthcare still being the most vulnerable sector. It is… Read More »Privacy by Design in Practice
Log Integrity Capabilities of SIEMs Log integrity and non-repudiation are key properties of audit logs. As SIEMs are usually the way to collect audit logs (among many other things) in large organizations, we have to make sure they give us those properties. We have discussed previously that it’s not… Read More »Log Integrity: How SIEMs Address the Issue and Is It Enough?
Most organizations have clearly separated roles for the Chief Compliance Officer and Chief Technical Officer. And this has worked well up until recently, as most standards and regulations had mostly legal and procedural implications and technical input was rarely required. At the same time, the CTO has been… Read More »The Need For A Chief IT Compliance Officer
Most large enterprises are using SAP’s ERP system. And the larger the enterprise is, the more compliance requirements it has to cover. This means, in part, that it’s vital to have the SAP Security Audit Log enabled, properly configured and properly protected. What is SAP Security Audit… Read More »How to Protect Your SAP Audit Logs
There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before
The FinTech industry is rapidly growing and although it has seen a decrease in the number of deals in recent months, it still maintains a good growth pace. It has proven to be a field that raises successful startup companies as 48 FinTech unicorns are… Read More »Lessons Learned from the Biggest FinTech Breaches
LogSentinel raised €1M to expand market opportunities so the company can take information security to a brand new level globally. LogSentinel will aim to expand fast on the global market, focusing on the company’s three main business verticals – FinTech, HealthTech and GovTech.
As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative that is powerful enough to unite the public and the private sector across all countries… Read More »LogSentinel joins the Paris Call for Trust and Security in Cyberspace
Digital Identity is a hot topic and is applicable to a wide range of scenarios. Virtually any organization has some form of digital identity in order to authenticate its employees, and some organizations, like banks and governments, have been identity providers to millions of people… Read More »NIST: Digital Identity Requires Secure Audit Trail
Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain
Central European Startup Awards (CESA) is part of the Global Startup Awards, aiming to unlock startups’ full potential by gathering the best ideas and minds from 63 countries across Europe, Asia, and Africa. In this year’s competition LogSentinel was awarded for ‘Best AI/ Machine Learning… Read More »LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019
Digital transformation led to many changes on a large scale. Innovative companies became the new market leaders in less than a decade. In fact, the understanding of digitalization changed in less than a decade. Everything became easier, more accessible and less time consuming to cope… Read More »Digital Transformation and Government Data Breaches
Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure
“Compliance” may sound boring and useless – consultants and lawyers are telling you how you should do things and then go around with checklists to see if everything fits a predefined vision of how a certain business should operate. And there are all sorts of… Read More »Technology-Driven Compliance
Many large organizations prefer to have their audit trail stored within their own infrastructure. Due to their structure and policies they are reluctant to use cloud services. Using a cloud service has the additional benefit of responsibility segregation – your sysadmins may not have the… Read More »Protecting On-Premise Audit Trail
LogSentinel is the big winner of DigitalK – the technological conference organised by Capital along with NEVEQ and LaunchHub. As a DigitalK grand winner, the company received 10,000 EUR reward, no strings attached. To get shortlisted across 100+ competitors Over 100+ international applicants and 13… Read More »LogSentinel Won DigitalK’s 2019 Prize Reward
What is the California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act that becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know… Read More »How will CCPA change the business landscape?
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The… Read More »HIPAA IT Compliance Guide: Main Things You Need to Consider
A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking… Read More »Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)
Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered… Read More »3 Reasons Not To Ignore Data Integrity
Logs – every system has them, but companies don’t usually pay much attention to them. At least not until a problem occurs. Log aggregation solutions come handy in many scenarios – tracing production issues, alerting on service degradation, fixing bugs, forensics, fraud detection. We’ve argued,… Read More »Comparison: LogSentinel vs Splunk vs Loggly, etc.
A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online,… Read More »Election Security and the Importance of Audit Trail
With the explosive growth of data businesses now can have a look at the very minutae of their processes. This includes details on which user took what action in which system, ranging from mission critical payments and asset transactions to the ultimately mundane users’ login… Read More »Fraud Detection: Approaches and Pitfalls
Organizations, especially those collecting and using personal data, must take the necessary measures to ensure the confidentiality, integrity, and security of the data, therefore to be GDPR compliant as stated in Article 5. This objective could be achieved only by following the best practices in… Read More »11 Cyber Security Tips to Achieve GDPR Compliance
The Payment Services Directive (Directive (EU) 2015/2366, PSD2) has been hailed as a game-changer that will transform the payment services landscape in Europe. While this outspoken enthusiasm reflects the deep changes it will bring, it sometimes fails to note that the increased freedom and elimination of market… Read More »The Payment Services Directive (PSD2) and its Logging Requirements
Crunchbase announced that Epic Games have implemented a 2FA in a very innovative way – Fortnite players can unlock a new emote by enabling two-factor authentication. Raising information security awareness across the youngest Internet audience is a challenging journey and it seems that Epic Games… Read More »Epic Games Turning on 2FA – The Rise of The InfoSec Awareness