Author name: brendon

Business Continuity Plan Audit Checklist

5 Identity and Access Management Best Practices

IAM Systems and You: 5 Best Practices Identity and access management is “a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities”, and it has become an essential element of any organization’s security strategy. But identity management protocols can only be effective when implemented properly. While access management IAM […]

5 Identity and Access Management Best Practices Read More »

Release Notes: March 2023

Hello, loyal acsense user! It’s time to get excited – the March 2023 acsense Production Release is now on the roll-out runway, and we’re here to announce some major new features and enhancements that are going to elevate your experience with us!   Generally Available Features We are thrilled to announce new geographic expansion, from

Release Notes: March 2023 Read More »

How to Secure Your Okta API

How to Secure Your Okta API Okta is by far one of the most widely-used application programming interfaces for cloud identity and access management. But many users mistakenly assume that it either doesn’t need to be secured or don’t even consider that securing Okta data and access could be a possibility. Failing to secure your

How to Secure Your Okta API Read More »

Digital Identity Resiliency_acsense

4 Ways to Boost Digital Identity Resiliency

4 Tips to Improve Your Organization’s Digital Identity Resilience No one wants their personal information leaked or stolen. But that’s exactly what is at risk if your organization doesn’t have a cyber resiliency strategy that covers digital identity and access management in place. Digital identities, or “digital IDs” are susceptible to security breaches and cyber-attacks, which

4 Ways to Boost Digital Identity Resiliency Read More »

US Cybersecurity Strategy: Emphasis on Resilience

National Cybersecurity Strategy: Emphasis on Resilience & Cyber Resilience The Biden-Harris Administration recently released the National Cybersecurity Strategy with the aim of securing a safe and secure digital ecosystem for all Americans. The strategy seeks to address complex threat environments and the increasing digital interdependencies that create new pathways for innovation. The administration believes that cybersecurity

US Cybersecurity Strategy: Emphasis on Resilience Read More »

How To Protect Your IAM Systems: A TAG Cyber Interview

How To Protect Your Cloud Based IAM Systems Cloud-based Identity Access Management (IAM) systems are highly vulnerable to security breaches, human error and insider threats. Businesses often erroneously believe that if a breach occurs, their SaaS provider will help them recover all sensitive data. However, most IAM systems don’t provide out-of-thebox backup and disaster recovery

How To Protect Your IAM Systems: A TAG Cyber Interview Read More »

Southwest Airlines System Failure: A Lesson For IAM Disaster Recovery

Southwest Airlines System Failure: A Lesson For IAM Disaster Recovery   Southwest Airlines could have made headlines for weathering the Storm Elliot with the right IT infrastructure that contributes to business continuity paired with smart and proactive back-up and recovery practices and tech stack – instead of making the news for a fully blown fiasco. 

Southwest Airlines System Failure: A Lesson For IAM Disaster Recovery Read More »

Release Notes: January 2023

Hello there, valued acsense user! It’s time to rev up your engines as we embark on our latest Production Release deployed as of January 2023. This update packs some thrilling features, improvements, and enhancements that will transform your user experience! Generally Available Features Industry-first Identity Access Investigation Platform: Unique ability to search for existing and

Release Notes: January 2023 Read More »

Scroll to Top
Skip to content