LogSentinel was founded several years ago with the vision of improving security for everyone and an initial goal of protecting audit log integrity. Initially, we implemented and scaled state-of-the-art research…
What Is Directive on Security of Network and Information Systems (NIS) The NIS Directive (Directive on Security of Network and Information Systems) is a European Union directive that (broadly speaking)…
You have probably seen many other SIEM buyer’s guides and realized that they are focused on large multinationals and Fortune 500 companies and you find them hard to relate to.…
Security Information and Event Management (SIEM) systems are crucial for every organization as they are able to detect malicious acts and even to prevent them. By converting simple audit logs…
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens…
Software-as-a-service is the norm now. All organizations, even the most conservative ones, are using some form of SaaS – be it for storage, email, customer management, marketing, or even low-code.…
Privacy-by-design (PbD) is an engineering and managerial approach taken when creating new technologies and systems. The term speaks for itself – you incorporate privacy measures at the design stage, so…
Logs in the IT context are a piece of evidence, automatically generated and time-stamped when a certain event happens. All information systems produce some kinds of logs. For the security…
What Is Searchable Encryption? Encryption is the method by which information is converted into a secret code that hides the information’s true meaning. Encryption is widely used to protect different…
Why Is Encryption Important? More and more companies get breached these days, undergoing huge financial and reputational losses. Over 5 billion records were compromised in 2019. The 2019 data breaches…
We have always focused on backend security on this blog. However, attackers sometimes try to steal sensitive information, including credit card numbers. That’s why we piloted LogSentinel SIEM’s Script Monitoring…