Cyber Security

cyber-security-practices

Cyber Security Best Practices: Learn how to protect your company from data breaches

Cyber Security Articles

In this category we will cover different articles related to how to protect your business from cyber crime, data breaches and personal data hacking.

IT Compliance Officer

The Need For A Chief IT Compliance Officer

Most organizations have clearly separated roles for the Chief Compliance Officer and Chief Technical Officer. And this has worked well up until recently, as most standards and regulations had mostly legal and procedural implications and technical input was rarely required. At the same time, the CTO has been… Read More »The Need For A Chief IT Compliance Officer

Track-What-you-have-never-tracked-before

Track Events You Have Not Tracked Before

There are a lot of products that allow collecting data, aggregating it and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors and catch-all multi-purpose data platforms (like Splunk). And when you… Read More »Track Events You Have Not Tracked Before

LogSentinel in 2019 - Recap

LogSentinel in 2019

LogSentinel 2019 Recap: All the success stories of LogSentinel during the last year – pilot projects, cyber security awards and recognitions, events and others

paris-call-logsentinel-cyber-security

LogSentinel joins the Paris Call for Trust and Security in Cyberspace

As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative that is powerful enough to unite the public and the private sector across all countries… Read More »LogSentinel joins the Paris Call for Trust and Security in Cyberspace

Protecting documents on blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain

LogSentinel-Founders

LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019

Central European Startup Awards (CESA) is part of the Global Startup Awards, aiming to unlock startups’ full potential by gathering the best ideas and minds from 63 countries across Europe, Asia, and Africa. In this year’s competition LogSentinel was awarded for ‘Best AI/ Machine Learning… Read More »LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019