Tag: Data Protection

The SolarWinds Hack - Missing Alarms and Security Visibility

The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It

A few days ago, on February 23, the US Senate Intelligence Committee held a hearing with executives from SolarWinds, FireEye, CrowdStrike and Microsoft about the SolarWinds hack. It’s worth listening in full, but we want to focus on one particular aspect described by the participants… Read More »The SolarWinds Hack: What Went Wrong With Missing Alarms and How To Fix It

Solorigate-SUNBURST

Five Things We Can Learn From Solorigate/SUNBURST, a Sophisticated And Highly Evasive Cyber Attack

This week the US government, as well as many enterprises, were hit by a cyberattack, dubbed Solorigate, via the SUNBURST backdoor. Fireeye (also a victim of the attack) has done a great analysis of how the attack works, and we recommend reading it. But we’ll… Read More »Five Things We Can Learn From Solorigate/SUNBURST, a Sophisticated And Highly Evasive Cyber Attack

AWS Security Score Security Infrastructure

AWS Security Score: We Focus On The Security Of Our Infrastructure

A security vendor should value their own infrastructure in order to prove the attention to detail required in the security world nowadays. We are proud that our infrastructure, where our customers’ data is held, meets security requirements, and follows best practices. LogSentinel and AWS Security… Read More »AWS Security Score: We Focus On The Security Of Our Infrastructure

centralized-vs-decentralized

Centralized vs. Decentralized Approaches to Protecting User Data

Due to the COVID-19 crisis, businesses and governments have developed contact tracing apps to help health authorities overcome the situation. Although the effectiveness of those applications is still unclear, they happen to process large amounts of personal data. Respectively some of them tend to operate… Read More »Centralized vs. Decentralized Approaches to Protecting User Data