nist-cyber-security-requirements-logs-digital-identity

NIST: Digital Identity Requires Secure Audit Trail

Digital Identity is a hot topic and is applicable to a wide range of scenarios. Virtually any organization has some form of digital identity in order to authenticate its employees, and some organizations, like banks and governments, have been identity providers to millions of people for a while now. Two years ago, the US National Read more about NIST: Digital Identity Requires Secure Audit Trail[…]

Protecting documents on blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document. Indeed, document fraud is often performed in such a trivial Read more about Protecting Documents Against Fraud and Manipulation With Blockchain[…]

gov-data-breach

Digital Transformation and Government Data Breaches

Digital transformation led to many changes on a large scale. Innovative companies became the new market leaders in less than a decade. In fact, the understanding of digitalization changed in less than a decade. Everything became easier, more accessible and less time consuming to cope with.  From paying bills online to checking highly sensitive information Read more about Digital Transformation and Government Data Breaches[…]

Facebook Plugins Compliance

Facebook Social Plugins and GDPR: The Court of Justice Ruling

This week The Court of Justice of the European Union ruled that websites are liable for Facebook’s tracking activities. This is an important decision that clarifies one of the most important outstanding GDPR issues – whether the consent you’ve given to Facebook exempts website owners from asking for consent. What is the Facebook like button? Read more about Facebook Social Plugins and GDPR: The Court of Justice Ruling[…]

digitalk-reward

LogSentinel Won DigitalK’s 2019 Prize Reward

LogSentinel Won DigitalK’s Big Prize LogSentinel is the big winner of DigitalK – the technological conference organised by Capital along with NEVEQ and LaunchHub. LogSentinel’s blockchain solution for sensitive data protection and tampering. As a DigitalK grand winner, the company received 10,000 EUR reward, no strings attached. To get shortlisted across 100+ competitors Over 100+ international applicants Read more about LogSentinel Won DigitalK’s 2019 Prize Reward[…]

SentinelDB_FinancesOnline_Awards

SentinelDB Honored with Compliance Management Software Awards by Premier Directory for Business Software

At LogSentinel, we are passionate about giving our clients the top-notch data protection they need. This is why we are proud to announce that FinancesOnline, a premier directory for business software, has certified us with the prestigious  2019 Rising Star Award and the 2019 Premium Usability Award. In their evaluation of the SentinelDB features, experts Read more about SentinelDB Honored with Compliance Management Software Awards by Premier Directory for Business Software[…]

SIEM-Data-Protection

SIEM Solutions and Data Protection Compliance

Security Information and Event Management (SIEM) systems are vital to each organisation. They transform simple event logs from various applications to detailed, in-depth behaviour analysis thanks to advanced visualizations and analytics and sometimes machine learning and AI. They contain a palette of aspects covering the most crucial information security issues. The final goal is achieving full Read more about SIEM Solutions and Data Protection Compliance[…]

How will CCPA change business landscape

How will CCPA change the business landscape?

What is California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act which becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know what data a business collected on them Right to object to Read more about How will CCPA change the business landscape?[…]

HIPAA IT Compliance | Main Things You Need to Know

HIPAA IT Compliance Guide: Main Things You Need to Consider

What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]

election-security-logging

Election Security and the Importance of Audit Trail

A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online, practically every country and every state has at Read more about Election Security and the Importance of Audit Trail[…]