Author name: brendon

Is Your IAM System Compliant?

Identity and Access Management Resilience: Key Questions To Ask Introduction: In today’s digital landscape, maintaining robust cybersecurity through compliant Identity and Access Management (IAM) systems is essential. With regulations like the EU’s Digital Operational Resilience Act (DORA) and U.S. frameworks including CISA directives and FFIEC guidelines emphasizing the importance of digital resilience in the financial […]

Is Your IAM System Compliant? Read More »

Introduction To Business Continuity Planning

Business Continuity Planning: Ensuring Your Business Thrives in Any Crisis Understanding Business Continuity A Business Continuity Plan (BCP) is more than just a contingency document; it’s a roadmap to keep your business running during unexpected disruptions, whether they are minor glitches or major crises. This guide provides comprehensive insights into the nuances of BCP, ensuring

Introduction To Business Continuity Planning Read More »

Defend Against LAPSUS$ Cyber Threats

Strengthen Your Cybersecurity Against LAPSUS$ Insider threat attacks are rising. The LAPSUS$ hacking group illustrates how even loosely organized hackers can significantly damage organizations using such techniques. The group has made tons of headlines for its cyberattacks. Their hacks into high-profile companies like Microsoft, SITEL, and T-Mobile surprised many. Their goal? Steal valuable data and threaten

Defend Against LAPSUS$ Cyber Threats Read More »

Release Notes January 2024

Hello Valued Customer! Acsense began deployment of the latest Production Release on January 2024. Generally Available Features New User Interface: Better tenant management and visibility: Improved view of Protected Okta tenant. Improved view of Continuous Replication and status of the Stand-By Okta tenant. New: constant visibility to ongoing Recoverability Reports. Role Based Access Control (RBAC)

Release Notes January 2024 Read More »

Decoding Cyber Warfare

Navigating the Waves of Digital Threats and Why Your Cyber Resilience Must Evolve “USA-247, also known as NRO Launch 39 or NROL-39, is an American reconnaissance satellite, operated by the National Reconnaissance Office and launched in December 2013. The USA-247 launch received a relatively high level of press coverage due to the mission’s choice of

Decoding Cyber Warfare Read More »

Cloud IAM Solutions: The Risks of Provider Dependency

Proactive Strategies for Managing Cloud IAM Risks and Ensuring Enterprise Security Introduction Prepared by  David Neuman Senior Analyst, TAG Cyber www.TAG-Cyber.com December 2023 Welcome to the era of cloud computing and Software-as-a-Service (SaaS) deployments! Identity and Access Management (IAM) has become a global concern for security teams with the rising adoption of SaaS applications in

Cloud IAM Solutions: The Risks of Provider Dependency Read More »

Scroll to Top
Skip to content