Cyber Security

cyber-security-practices

Cyber Security Best Practices: Learn how to protect your company from data breaches

Cyber Security Articles

In this category, we will cover different articles related to how to protect your business from cybercrime, data breaches, and personal data hacking.

preventing-data-breaches

Preventing Various Types of Data Breaches

Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit… Read More »Preventing Various Types of Data Breaches

log integrity SIEMs

Log Integrity: How SIEMs Address the Issue and Is It Enough?

Log Integrity Capabilities of SIEMs Log integrity and non-repudiation are key properties of audit logs. As SIEMs are usually the way to collect audit logs (among many other things) in large organizations, we have to make sure they give us those properties. We have discussed previously that it’s not… Read More »Log Integrity: How SIEMs Address the Issue and Is It Enough?

IT Compliance Officer

The Need For A Chief IT Compliance Officer

Most organizations have clearly separated roles for the Chief Compliance Officer and Chief Technical Officer. And this has worked well up until recently, as most standards and regulations had mostly legal and procedural implications and technical input was rarely required. At the same time, the CTO has been… Read More »The Need For A Chief IT Compliance Officer

Track-What-you-have-never-tracked-before

Track Events You Have Not Tracked Before

There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before

LogSentinel in 2019 - Recap

LogSentinel in 2019

LogSentinel 2019 Recap: All the success stories of LogSentinel during the last year – pilot projects, cyber security awards and recognitions, events and others

paris-call-logsentinel-cyber-security

LogSentinel joins the Paris Call for Trust and Security in Cyberspace

As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative that is powerful enough to unite the public and the private sector across all countries… Read More »LogSentinel joins the Paris Call for Trust and Security in Cyberspace

Protecting documents on blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain

LogSentinel-Founders

LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019

Central European Startup Awards (CESA) is part of the Global Startup Awards, aiming to unlock startups’ full potential by gathering the best ideas and minds from 63 countries across Europe, Asia, and Africa. In this year’s competition LogSentinel was awarded for ‘Best AI/ Machine Learning… Read More »LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019

Digital Transformation and Security

Digital Transformation Happens Too Fast to Be Secure

Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure

LogSentinel-winning-DigitalK-startup-award-2019

LogSentinel Won DigitalK’s 2019 Prize Reward

LogSentinel is the big winner of DigitalK – the technological conference organised by Capital along with NEVEQ and LaunchHub. As a DigitalK grand winner, the company received 10,000 EUR reward, no strings attached. To get shortlisted across 100+ competitors Over 100+ international applicants and 13… Read More »LogSentinel Won DigitalK’s 2019 Prize Reward

HIPAA IT Compliance | Main Things You Need to Know

HIPAA IT Compliance Guide: Main Things You Need to Consider

What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The… Read More »HIPAA IT Compliance Guide: Main Things You Need to Consider

Acronis Conference IT Security

Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)

A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking… Read More »Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)

PSD2 directive

The Payment Services Directive (PSD2) and its Logging Requirements

The Payment Services Directive (Directive (EU) 2015/2366, PSD2) has been hailed as a game-changer that will transform the payment services landscape in Europe. While this outspoken enthusiasm reflects the deep changes it will bring, it sometimes fails to note that the increased freedom and elimination of market… Read More »The Payment Services Directive (PSD2) and its Logging Requirements

Fortnite_EpicGames_2FA

Epic Games Turning on 2FA – The Rise of The InfoSec Awareness

Crunchbase announced that Epic Games have implemented a 2FA in a very innovative way – Fortnite players can unlock a new emote by enabling two-factor authentication. Raising information security awareness across the youngest Internet audience is a challenging journey and it seems that Epic Games… Read More »Epic Games Turning on 2FA – The Rise of The InfoSec Awareness