Security breaches are becoming increasingly commonplace and dangerous. The World Economic Forum nominated cyber-attacks as one of the major threats to global stability for 2019. Not only money is at stake, as breaches have an appalling effect on organizations’ reputation, trustworthiness, and often prove to… Read More »The 2020 Must-Know Security Breach Statistics
In this blog category, you will find information about data protection, data processing, and all the IT perspectives from protecting data online.
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit… Read More »Preventing Various Types of Data Breaches
What Is Searchable Encryption? Encryption is the method by which information is converted into a secret code that hides the information’s true meaning. Encryption is widely used to protect different kinds of data stored and transferred online, in order to protect malicious actors from revealing… Read More »Why Is Searchable Encryption So Important?
Why Is Encryption Important? More and more companies get breached these days, undergoing huge financial and reputational losses. Over 5 billion records were compromised in 2019. The 2019 data breaches cost businesses over $2 trillion in total. The chance of a company becoming a data breach… Read More »Data Encryption: Importance, Best Practices, IT Compliance
Electronic signatures are legally meaningful ways to store interaction by end-users. That’s an oversimplified explanation and certainly not a definition, but in the context of web and mobile applications, it is that. The European Union defined electronic signatures in a regulation (eIDAS) in order to… Read More »Practical Electronic Signatures For Your Website
During the webinar Bozhidar Bozhanov will review the types of encryption, their benefits across different scenarios and the challenges in using encryption.
Due to the COVID-19 crisis, businesses and governments have developed contact tracing apps to help health authorities overcome the situation. Although the effectiveness of those applications is still unclear, they happen to process large amounts of personal data. Respectively some of them tend to operate… Read More »Centralized vs. Decentralized Approaches to Protecting User Data
Personal health information (PHI) is very sensitive and is therefore subject to many regulations around the world – most notably, GDPR in the EU and HIPAA in the US. We have covered both regulations in depth (GDPR articles, HIPAA articles), but the specifics of each… Read More »How to Store Personal Health Information Securely
It is no secret that the German healthcare sector is heavily regulated in all possible aspects. The new Digital Health Applications Ordinance (DiGAV) of 21st April 2020 allows only approved digital health apps (DiGA) to be reimbursed by the patient’s health insurance. We have previously… Read More »How to Easily Cover the New DiGAV Data Protection Requirements
The US presidential election is in a few months and although the coronavirus is currently occupying everyone’s attention, it will soon be shifting to the election. And among the chief concerns is election security and integrity. We have previously covered the importance of audit trail for election… Read More »Technical Guide to Protecting Voter Registration Databases
In light of the COVID-19 pandemic, governments and corporations leverage contact tracing mobile applications to help health authorities overcome the crisis. Those apps process vast amounts of sensitive personal data and sometimes operate in the gray area of data protection regulations. As we believe in privacy… Read More »Webinar: Privacy in Time of Pandemic
Privacy legislation around the world is different in its technicalities but has a lot in common. The most famous recent laws are GDPR (EU but with extra-territorial effect) and CCPA (California, but practically affects the US and even services outside the US). The Accountability Aspect… Read More »The Role of Accountability in Data Privacy As Seen in GDPR and CCPA
Most organizations have clearly separated roles for the Chief Compliance Officer and Chief Technical Officer. And this has worked well up until recently, as most standards and regulations had mostly legal and procedural implications and technical input was rarely required. At the same time, the CTO has been… Read More »The Need For A Chief IT Compliance Officer
California Consumer Privacy Act (CCPA) is the new privacy law in California that affects a lot of organizations due to its extraterritorial effect. We have already covered CCPA with a high-level overview, covering what is it about, who is bounded to comply with it, what are the… Read More »Database Security and CCPA Compliance
Digital Identity is a hot topic and is applicable to a wide range of scenarios. Virtually any organization has some form of digital identity in order to authenticate its employees, and some organizations, like banks and governments, have been identity providers to millions of people… Read More »NIST: Digital Identity Requires Secure Audit Trail
PRESS RELEASE: Blockchain company LogSentinel Pushes The Next Frontier Putting Corporate Docs On The Ledger
Highlights: Blockchain and AI are now responsible for keeping confidential commercial files safe New Models of strategic partnership keep data on the blockchain Revolutionizing supply chains – no more confusion and fraud across partners The hype about blockchain technology and all the use cases where… Read More »PRESS RELEASE: Blockchain company LogSentinel Pushes The Next Frontier Putting Corporate Docs On The Ledger
Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain
Digital transformation led to many changes on a large scale. Innovative companies became the new market leaders in less than a decade. In fact, the understanding of digitalization changed in less than a decade. Everything became easier, more accessible and less time consuming to cope… Read More »Digital Transformation and Government Data Breaches
This week The Court of Justice of the European Union ruled that websites are liable for Facebook’s tracking activities. This is an important decision that clarifies one of the most important outstanding GDPR issues – whether the consent you’ve given to Facebook exempts website owners from… Read More »Facebook Social Plugins and GDPR: The Court of Justice Ruling
Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure
LogSentinel is the big winner of DigitalK – the technological conference organised by Capital along with NEVEQ and LaunchHub. As a DigitalK grand winner, the company received 10,000 EUR reward, no strings attached. To get shortlisted across 100+ competitors Over 100+ international applicants and 13… Read More »LogSentinel Won DigitalK’s 2019 Prize Reward
SentinelDB Honored with Compliance Management Software Awards by Premier Directory for Business Software
At LogSentinel, we are passionate about giving our clients the top-notch data protection they need. This is why we are proud to announce that FinancesOnline, a premier directory for business software, has certified us with the prestigious 2019 Rising Star Award and the 2019 Premium… Read More »SentinelDB Honored with Compliance Management Software Awards by Premier Directory for Business Software
What is the California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act that becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know… Read More »How will CCPA change the business landscape?
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The… Read More »HIPAA IT Compliance Guide: Main Things You Need to Consider
A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online,… Read More »Election Security and the Importance of Audit Trail
Read More »GDPR – A Practical Guide for Developers
We’d like to share an article from our founder’s blog about the technical aspects of GDPR. LogSentinel can solve some of the GDPR issues, namely guaranteeing data integrity and logging access to data. Enjoy the article.
Like this article? Share it with your network!
Bozhidar Bozhanov is co-founder and the CEO at LogSentinel. He is a senior software engineer and solution architect with 15 years of experience in the software industry. Bozhidar has been a speaker at numerous conferences and is among the popular bloggers and influencers in the technical field. He’s also a former government advisor on e-government, transparency and information security.