There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before
Tag: Data Protection
California Consumer Privacy Act (CCPA) is the new privacy law in California that affects a lot of organizations due to its extraterritorial effect. We have already covered CCPA with a high-level overview, covering what is it about, who is bounded to comply with it, what are the… Read More »Database Security and CCPA Compliance
The FinTech industry is rapidly growing and although it has seen a decrease in the number of deals in recent months, it still maintains a good growth pace. It has proven to be a field that raises successful startup companies as 48 FinTech unicorns are… Read More »Lessons Learned from the Biggest FinTech Breaches
PRESS RELEASE: Blockchain company LogSentinel Pushes The Next Frontier Putting Corporate Docs On The Ledger
Highlights: Blockchain and AI are now responsible for keeping confidential commercial files safe New Models of strategic partnership keep data on the blockchain Revolutionizing supply chains – no more confusion and fraud across partners The hype about blockchain technology and all the use cases where… Read More »PRESS RELEASE: Blockchain company LogSentinel Pushes The Next Frontier Putting Corporate Docs On The Ledger
Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain
Digital transformation led to many changes on a large scale. Innovative companies became the new market leaders in less than a decade. In fact, the understanding of digitalization changed in less than a decade. Everything became easier, more accessible and less time consuming to cope… Read More »Digital Transformation and Government Data Breaches
This week The Court of Justice of the European Union ruled that websites are liable for Facebook’s tracking activities. This is an important decision that clarifies one of the most important outstanding GDPR issues – whether the consent you’ve given to Facebook exempts website owners from… Read More »Facebook Social Plugins and GDPR: The Court of Justice Ruling
Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”, “trips to Mars”, “brain-computer-interface” type of innovation. It’s a mundane, often boring organizational innovation that… Read More »Digital Transformation Happens Too Fast to Be Secure
“Compliance” may sound boring and useless – consultants and lawyers are telling you how you should do things and then go around with checklists to see if everything fits a predefined vision of how a certain business should operate. And there are all sorts of… Read More »Technology-Driven Compliance
Identity and Access Management (IAM) is core to many enterprise architectures. Centralizing the authentication is mandatory once you have more than a few systems, and IAM providers fill that requirement nicely. On first thought it might seem blockchain has nothing to do with IAM. But… Read More »Blockchain Use-Cases for IAM
Hash functions are at the core of many, many technologies, including ours. We rely on SHA-512 to create a hash chain to guarantee the integrity of logs. Hash functions have one very important property – collision resistance. If two different inputs generate the same hash,… Read More »We Found Collision For SHA-512
What is the California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act that becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know… Read More »How Will CCPA Change the Business Landscape?
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The… Read More »HIPAA Technical Safeguards: Main HIPAA Aspects to Consider
A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking… Read More »Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)
Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered… Read More »3 Reasons Not To Ignore Data Integrity
A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online,… Read More »Election Security and the Importance of Audit Trail
With the explosive growth of data businesses now can have a look at the very minutae of their processes. This includes details on which user took what action in which system, ranging from mission critical payments and asset transactions to the ultimately mundane users’ login… Read More »Fraud Detection: Approaches and Pitfalls
LogSentinel was presented by our CEO at the Innovation Summit on Banking and Insurance in Austria earlier this month, organized by LSZ consulting, whom we thank for inviting us. The talk was an overview of the problems of existing audit trail solutions in use in… Read More »LogSentinel Was Presented at the Innovation Summit on Banking and Insurance
Organizations, especially those collecting and using personal data, must take the necessary measures to ensure the confidentiality, integrity, and security of the data, therefore to be GDPR compliant as stated in Article 5. This objective could be achieved only by following the best practices in… Read More »11 Cyber Security Tips to Achieve GDPR Compliance
The hype about GDPR is dying off, as apparently the world didn’t end on May 25th. However, best practices in data protection are still valid, and we’d like to focus on logging as one of them.
Nowadays, data security and data protection are crucially important not only for the business but also for the public sector. To safeguard the customers’ rights, organizations must follow established rules and regulations and the best security standards such as the GDPR and PCI DSS. Overall… Read More »GDPR vs PCI DSS: How they complement each other
The Payment Services Directive (Directive (EU) 2015/2366, PSD2) has been hailed as a game-changer that will transform the payment services landscape in Europe. While this outspoken enthusiasm reflects the deep changes it will bring, it sometimes fails to note that the increased freedom and elimination of market… Read More »The Payment Services Directive (PSD2) and its Logging Requirements
Crunchbase announced that Epic Games have implemented a 2FA in a very innovative way – Fortnite players can unlock a new emote by enabling two-factor authentication. Raising information security awareness across the youngest Internet audience is a challenging journey and it seems that Epic Games… Read More »Epic Games Turning on 2FA – The Rise of The InfoSec Awareness
The Mueller Indictment of 12 Russian agents was released last week. It is a very interesting read as a whole, but it outlines some particular aspects of cybersecurity. During the hacking of DCCC and DNC networks, the Conspirators covered their tracks by intentionally deleting logs [..]… Read More »The Mueller Indictment: Proof That You Need Secure Logs
Raiffeisenbank Bulgaria Awards LogSentinel and Starts Scoping Information Security Project on the Blockchain
LogSentinel has seized the chance to take part and present its innovative blockchain-based security product in the Elevator Lab Challenge competition organized by Raiffeisenbank. Elevator Lab is the largest corporate fintech accelerator in Central and Eastern Europe. It was created by Raiffeisen Bank International and aims… Read More »Raiffeisenbank Bulgaria Awards LogSentinel and Starts Scoping Information Security Project on the Blockchain
GDPR is a topic that has concerned EU-based companies since 2016. In became effective on the 25th of May 2018. However, not just EU-based companies need to be concerned about the personal data processed by their organization. More and more US-based ones are also looking… Read More »What US Companies Need To Know About GDPR
Our founder Bozhidar Bozhanov has given a useful presentation about the technical aspects and best practices of GDPR on a meetup in Amsterdam last week. You can see the slides here: If you’re interested, you can also join a webinar on the same topic, organized… Read More »A presentation about GDPR for developers
Read More »GDPR – A Practical Guide for Developers
We’d like to share an article from our founder’s blog about the technical aspects of GDPR. LogSentinel can solve some of the GDPR issues, namely guaranteeing data integrity and logging access to data. Enjoy the article.
Bozhidar Bozhanov is a senior software engineer and solution architect with 15 years of experience in the software industry. Bozhidar has been a speaker at numerous conferences and is among the popular bloggers and influencers in the technical field. He’s also a former government advisor on e-government, transparency, and information security.