Author name: brendon

Secure Web Apps with Okta’s Identity-Driven Approach

Strengthening Web Application Security with an Identity-Driven Approach In the rapidly evolving world of cybersecurity, safeguarding sensitive data and ensuring user information remains secure emerge as top priorities for organizations globally. An estimate shows the average data breach cost could exceed $4M per incident in 2023. This affects backend web developers who face the challenge of fortifying […]

Secure Web Apps with Okta’s Identity-Driven Approach Read More »

Safeguard Your Backend with Okta Backup Codes!

Enhancing Authentication Security with Okta Backup Codes Index: Introduction Understanding Okta Backup Codes The Role Of Backup Codes In Backend Security Integration And Implementation Enhancing Protection Against Account Compromises Use Cases of Okta Backup Codes Best Practices Challenges And Mitigation Strategies Conclusion Introduction In mid-2022, Chinese e-commerce giant, Alibaba, revealed that its servers were compromised.

Safeguard Your Backend with Okta Backup Codes! Read More »

Release Notes: August 2023

Hello valued customer! Acsense began deployment of the latest Production Release on August 2023. Generally Available Features Support the backup of Authorization Server entities Full support for backup and recovery of Custom Attributes Full support for Single User recovery from various states Generally Available Enhancements UI improvements: Related objects views Continuous Replication to stand-by tenant

Release Notes: August 2023 Read More »

Disaster Recovery Planning: Roles, Responsibilities, & Combatting the Bystander Effect

Disaster Recovery – Who’s Job Is It? With cyber threats on the rise, most companies understand the importance of disaster recovery. According to one survey, 85% of companies have some sort of disaster recovery plan in place. This plan is a crucial tool for ensuring a company is prepared for a cyber incident. Creating, updating,

Disaster Recovery Planning: Roles, Responsibilities, & Combatting the Bystander Effect Read More »

The Hidden Cost of IAM Downtime: Impact on Business Continuity & Reputation

Identity Access Management Disasters: The True Cost of Downtime Based on an interview with Kayla Williams, CISO @Devo.   We’ve done some homework on the subject and are ready to take you on a ride through the dynamic, and occasionally detrimental, experience of identity access management disasters. If your business has been left untouched so

The Hidden Cost of IAM Downtime: Impact on Business Continuity & Reputation Read More »

Unpacking IAM Recovery Time Objective: A Deep Dive on Navigating Downtime

How To Estimate Your Identity and Access Management Recovery Time Objective Based on an interview with Kayla Williams, CISO @Devo. Navigating the intricacies of identity and access management systems, like those offered by Okta, requires an understanding of the roles both you and your vendor play. One critical element is the recovery time in case of

Unpacking IAM Recovery Time Objective: A Deep Dive on Navigating Downtime Read More »

Scroll to Top
Skip to content