Cyber Security

cyber-security-practices

Cyber Security Best Practices: Learn how to protect your company from data breaches

Cyber Security Articles

In this category, we will cover different articles related to how to protect your business from cybercrime, data breaches, and personal data hacking.

CTO-Talk-LogSentinel-Cybersecurity

CTO Talk: Strategic guidelines for an intelligent cybersecurity system

The Privacy Management (PMT), Privacy by design (PbD) and Privacy Impact Assessment (PIA) tools, Integration of Data Management and Security, Integration of Extensible Key Management (EKM) and Cloud Key Management as a Service (KMaaS), Data Security as a Service (DSaaS), Data Security Platforms and Cloud… Read More »CTO Talk: Strategic guidelines for an intelligent cybersecurity system

Ransomware

The Colonial Pipeline Ransomware: Why It’s Hard To Be Protected

After every major cyberattack, security vendors like LogSentinel are expected to write something on preventing future similar incidents, probably involving their technology. And yes, we do have a ransomware prevention page that outlines the key features of LogSentinel SIEM to fight against ransomware. But it’s… Read More »The Colonial Pipeline Ransomware: Why It’s Hard To Be Protected