Information Security Tag

SIEM for Google Cloud Platform

SIEM for Google Cloud Platform

  • SIEM

Google Cloud Platform and Security Monitoring Google Cloud Platform (GCP) is attracting a lot of companies, large and small, with its stability and many built-in services. But aggregated security monitoring has to be done via an external service.   However, log aggregation for security purposes… Read More »SIEM for Google Cloud Platform

The SolarWinds Hack - Missing Alarms and Security Visibility

The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It

A few days ago, on February 23, the US Senate Intelligence Committee held a hearing with executives from SolarWinds, FireEye, CrowdStrike and Microsoft about the SolarWinds hack. It’s worth listening in full, but we want to focus on one particular aspect described by the participants… Read More »The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It

Solorigate-SUNBURST

Five Things We Can Learn From Solorigate/SUNBURST, a Sophisticated And Highly Evasive Cyber Attack

This week the US government, as well as many enterprises, were hit by a cyberattack, dubbed Solorigate, via the SUNBURST backdoor. Fireeye (also a victim of the attack) has done a great analysis of how the attack works, and we recommend reading it. But we’ll… Read More »Five Things We Can Learn From Solorigate/SUNBURST, a Sophisticated And Highly Evasive Cyber Attack

AWS Security Score Security Infrastructure

AWS Security Score: We Focus On The Security Of Our Infrastructure

A security vendor should value their own infrastructure in order to prove the attention to detail required in the security world nowadays. We are proud that our infrastructure, where our customers’ data is held, meets security requirements, and follows best practices. LogSentinel and AWS Security… Read More »AWS Security Score: We Focus On The Security Of Our Infrastructure

centralized-vs-decentralized

Centralized vs. Decentralized Approaches to Protecting User Data

Due to the COVID-19 crisis, businesses and governments have developed contact tracing apps to help health authorities overcome the situation. Although the effectiveness of those applications is still unclear, they happen to process large amounts of personal data. Respectively some of them tend to operate… Read More »Centralized vs. Decentralized Approaches to Protecting User Data

LogSentinel joins the Paris Call for Trust and Security in Cyberspace

LogSentinel joins the Paris Call for Trust and Security in Cyberspace

As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative that is powerful enough to unite the public and the private sector across all countries… Read More »LogSentinel joins the Paris Call for Trust and Security in Cyberspace

Visa-innovation_startup

LogSentinel at Visa Innovation Program – Redefining Financial Cybersecurity Standards

About Visa Innovation Program Visa Innovation Program, powered by Eleven Ventures and Visa, is created to address some of the most challenging problems in the financial industry, with the main focus on end consumers, small enterprises, and financial institutions. The program gathers know-how and talent… Read More »LogSentinel at Visa Innovation Program – Redefining Financial Cybersecurity Standards

Digital Transformation Happens Too Fast to Be Secure

Digital Transformation Happens Too Fast to Be Secure

Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure

LogSentinel-Pioneers-Govtech-certificate

LogSentinel Wins the Cyber Security Award by Pioneers

2019 starts fantastic for LogSentinel: onboarding some of the Fortune100 companies like IBM, getting SentinelDB on the market and scoping projects with new partners and clients. The latest great recognition we received was related to the GovTech.Pioneers event. The GovTech.Pioneers event: Manifesting innovation Europe’s leading… Read More »LogSentinel Wins the Cyber Security Award by Pioneers

Acronis Conference IT Security

Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)

A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking… Read More »Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)