Author name: brendon

Zero Trust in IAM

A Comprehensive Guide to Zero Trust in IAM Zero trust has been emerging as a cornerstone of a robust cybersecurity defense strategy. This concept, built on the principle of “Never trust, always verify,” stresses the importance of not implicitly trusting, even within organizational networks. As zero trust is a significant concept in cybersecurity, it is

Zero Trust in IAM Read More »

3-2-1 Backup Strategy: A Roadmap for IT & Security Professionals

Mastering the 3-2-1 Backup Strategy Data security and integrity are crucial in today’s digital age, and losing critical data can lead to significant setbacks. This concern is particularly relevant for IT Managers, Security Experts, and GRC Leaders, who are tasked with safeguarding the organization’s digital assets. These professionals play a pivotal role in maintaining the

3-2-1 Backup Strategy: A Roadmap for IT & Security Professionals Read More »

Analyzing MGM Resorts’ Response to the Scattered Spider Ransomware Attack

The MGM Resorts Ransomware Attack by Scattered Spider Las Vegas, Nevada – September 26, 2023 – MGM Resorts International, a global hospitality and entertainment company, recently found itself in the crosshairs of a malicious ransomware attack orchestrated by the notorious Scattered Spider cybercriminal group. This incident not only underscored the growing threat of cyberattacks but

Analyzing MGM Resorts’ Response to the Scattered Spider Ransomware Attack Read More »

Are You Prepared for Okta’s New Customer Data Retention Policy?

Understanding Okta’s Policy Shift and Acsense’s Resilience Solutions In the fast-paced world of digital security and identity management, staying informed about policy changes is crucial.  Okta, a trusted identity and access management leader, is gearing up for an important update to its Customer Data Retention Policy. This change impacts how long your valuable System Log

Are You Prepared for Okta’s New Customer Data Retention Policy? Read More »

Scroll to Top
Skip to content