Many organizations understand that the integrity of their audit trail is important only after a security incident takes place and they realize they cannot rely on their audit logs. Having had a lot of experience in this area here at LogSentinel, as an information security… Read More »Webinar: Audit Trail in Large Organisations
Learn more about latest news, trends and tips on cyber security and how to protect personal data online, achieving regulatory compliance.
The FinTech industry is rapidly growing and although it has seen a decrease in the number of deals in recent months, it still maintains a good growth pace. It has proven to be a field that raises successful startup companies as 48 FinTech unicorns are… Read More »Lessons Learned from the Biggest FinTech Breaches
As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative that is powerful enough to unite the public and the private sector across all countries… Read More »LogSentinel joins the Paris Call for Trust and Security in Cyberspace
About Visa Innovation Program Visa Innovation Program, powered by Eleven Ventures and Visa, is created to address some of the most challenging problems in the financial industry, with the main focus on end consumers, small enterprises, and financial institutions. The program gathers know-how and talent… Read More »LogSentinel at Visa Innovation Program – Redefining Financial Cybersecurity Standards
Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure
With the explosive growth of data businesses now can have a look at the very minutae of their processes. This includes details on which user took what action in which system, ranging from mission critical payments and asset transactions to the ultimately mundane users’ login… Read More »Fraud Detection: Approaches and Pitfalls
Organizations, especially those collecting and using personal data, must take the necessary measures to ensure the confidentiality, integrity, and security of the data, therefore to be GDPR compliant as stated in Article 5. This objective could be achieved only by following the best practices in… Read More »11 Cyber Security Tips to Achieve GDPR Compliance