In 2022, generative AI has gone mainstream, but what many don’t know is that generative models can also have a dark side, they have given rise to a new breed of cyber attacks. These attacks exploit the defining property of generative models—their ability to generate… Read More »CTO Talk: ChatGPT vs GuardGPT. Generative AI in the context of cybersecurity.
LogSentinel’s operational security platform (SIEM, XDR & SOAR) continuously optimizes the models of specialized threat systems and has created eight layers of anti-threat weapons. Based on the characteristics of user behavior and traffic analysis, the series of local anti-threat modules form an iron wall to… Read More »CTO Talk: Eight Built-in Layers of Threat-Fighting Weapons
The LogSentinel reactive security operations platform continues to integrate new cyber defense capabilities, source tracking and combat. The system integrates AI, XDR (EDR, NDR, MDR), scouting, surveillance, traceability, protection, response and confrontation capabilities. The AI module for combat-oriented operations identifies risks before the attack, intercepts,… Read More »Cyber-Attacks – Monitoring, Prediction, and Confrontation
Based on blockchain technology, LogSentinel designs and implements a zero-trust security system that stores data on-chain, uploads local log files to the blockchain for storage, and provides a visual interface for users to use security analysis functions. The system can provide safe and reliable storage… Read More »CTO-Talk: Defense Artifacts for Zero-Trust Security
Most of the current SIEM, SOAR, and XDR solutions with integrated deep neural networks focus only on rough correlations that have no causal relationship, which often leads to testing of deep learning systems in real conditions that are significantly different from learning scenarios, and they… Read More »CTO Talk: From the Sandbox – LogSentinel’s Neural Network
The Privacy Management (PMT), Privacy by design (PbD) and Privacy Impact Assessment (PIA) tools, Integration of Data Management and Security, Integration of Extensible Key Management (EKM) and Cloud Key Management as a Service (KMaaS), Data Security as a Service (DSaaS), Data Security Platforms and Cloud… Read More »CTO Talk: Strategic guidelines for an intelligent cybersecurity system