Author name: brendon

Release Notes January 2024

Hello Valued Customer! Acsense began deployment of the latest Production Release on January 2024. Generally Available Features New User Interface: Better tenant management and visibility: Improved view of Protected Okta tenant. Improved view of Continuous Replication and status of the Stand-By Okta tenant. New: constant visibility to ongoing Recoverability Reports. Role Based Access Control (RBAC) […]

Release Notes January 2024 Read More »

Decoding Cyber Warfare

Navigating the Waves of Digital Threats and Why Your Cyber Resilience Must Evolve “USA-247, also known as NRO Launch 39 or NROL-39, is an American reconnaissance satellite, operated by the National Reconnaissance Office and launched in December 2013. The USA-247 launch received a relatively high level of press coverage due to the mission’s choice of

Decoding Cyber Warfare Read More »

Cloud IAM Solutions: The Risks of Provider Dependency

Proactive Strategies for Managing Cloud IAM Risks and Ensuring Enterprise Security Introduction Prepared by  David Neuman Senior Analyst, TAG Cyber www.TAG-Cyber.com December 2023 Welcome to the era of cloud computing and Software-as-a-Service (SaaS) deployments! Identity and Access Management (IAM) has become a global concern for security teams with the rising adoption of SaaS applications in

Cloud IAM Solutions: The Risks of Provider Dependency Read More »

Okta Terraform Misconceptions

Guest Post: Barry Gordon, Head Coach & Founder at Identity Coach Okta Terraform ≠ Okta Disaster Recovery Can You use Okta Terraform to Backup and Recover an Okta Tenant? This is a common question from teams who rely on Okta Terraform to deploy and configure critical infrastructure. The Terraform Okta provider is an incredible tool for incorporating identity components

Okta Terraform Misconceptions Read More »

Zero Trust in IAM

A Comprehensive Guide to Zero Trust in IAM Zero trust has been emerging as a cornerstone of a robust cybersecurity defense strategy. This concept, built on the principle of “Never trust, always verify,” stresses the importance of not implicitly trusting, even within organizational networks. As zero trust is a significant concept in cybersecurity, it is

Zero Trust in IAM Read More »

Scroll to Top
Skip to content