David Vongries, developer of the Kirki Customizer Framework plugin, announced he is sunsetting the product and will discontinue development and support. Vongries bought the plugin in 2020 from its original creator, Ari Stathopoulos, and grew its user base from 400K to 600K active installs. He launched Kirki PRO with additional extensions in March 2022.
“When I first acquired Kirki in early 2020, I had big plans for it,” Vongries said. “Although we were able to execute on step one of the 2-step plan we had for the plugin, as time went on, I lost passion for the project mainly due to the direction WordPress core has taken with Gutenberg.
“It’s clear to me now that I was too ambitious in taking on the project.”
Kirki’s customizer framework enabled theme authors to add custom controls and advanced features to the customizer, including the ability to style it, and add a custom header. Although block theme adoption has been a slow process, the death knell for the Customizer rang years ago.
In 2020, Vongries said that exploring how Kirki could potentially extend Gutenberg was one of his goals. Stathopoulos had also discussed the possibility of moving away from the customizer to work with full-site editing and global styles, helping themes that use Kirki transition to global styles. These goals did not materialize but the potential for them is still there.
Vongries is now looking for someone to acquire the plugin but is committed to providing limited support to users in the meantime, including fixing critical bugs and compatibility issues that happen as the result of WordPress core updates.
“The current active install count in the WordPress repository is 600,000, which presents a great opportunity to revamp the plugin and get it in front of actual users,” he said. “I believe that there’s still great potential in Kirki, and I’m looking for someone who shares that vision to take it forward.”
Vongries has put a price tag of $30K on the plugin, which includes all the assets – the website, GitHub, and PRO extensions. No further active development or updates are planned unless Kirki gets acquired by someone who wants to carry it forward.
Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web…
Featured image by Fernando Arcos via Pexels
Companies must follow all applicable laws and regulations to protect their customers’ personal information and conduct legitimate business. As new rules take effect and data breaches occur on a daily basis, it can be difficult for organizations to ensure that they’re in full compliance with all applicable laws and regulations. One way to streamline this process and improve compliance monitoring is to use identity and access management (IAM) technologies.
When it comes to managing digital identities, restricting access to resources, and guaranteeing data security, IAM solutions are essential for enterprises that deal with sensitive information.
RELATED ARTICLE: WHAT DOES PUBLIC POLICY MEAN? A SIMPLIFIED GUIDE
Let’s take a deeper dive into how IAM solutions simplify conforming to rules and regulations.
Businesses that value privacy and the efficient administration of a large user base now consider identity and access management systems an absolute necessity. Innovative IAM solutions like SSO, MFA, and PAM are necessary in today’s complicated digital environment for maintaining digital identities and restricting access to resources.
These solutions address complex requirements. However, internal management of IAM solutions is typically time-consuming. Moreover, inhouse staff may lack the technical skills needed to create successful solutions.
This is where investing in an IAM platform, such as Ping Identity, can be beneficial. Their extensive experience in providing IAM solutions can help businesses implement customized and effective solutions that cater to their unique requirements. In addition, the ongoing support ensures that your IAM solution remains up-to-date and effective. This will provide you with peace of mind and better protection against digital threats.
When it comes to meeting their compliance and regulatory duties, businesses face challenges that vary widely based on their size, location, and sector. Access control, audit trails, and user management are just a few of the measures companies must take to prevent unauthorized access to private information. These conditions are essential for effectively monitoring all activity and handling user accounts.
Consequences and penalties for violating laws like the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA) can be severe. Therefore, it’s crucial for the safety of client data that businesses be aware of and abide by these requirements. Despite the difficulty, organizations must strive to fulfill regulatory obligations. They do so not only to reduce risk but also to stay out of legal trouble.
RELATED ARTICLE: HOW TO FIND UNIQUE ENGINEERING SOLUTIONS
Businesses that care about doing the right thing by the law need identity and access management solutions more than anything else. To ensure that only authorized individuals have access to private information, these solutions provide for the management of digital identities. They also monitor and regulate data access. Access management, audit trails, and user management are all aspects of IAM. These elements are essential for a company to satisfy regulatory criteria.
By requiring authentication from users before granting them access, IAM solutions like single sign-on and multi-factor authentication greatly lessen the likelihood of security breaches. Privileged access management (PAM) is an IAM solution that allows users to build and maintain audit trails. These audit trails document who accessed data, when they accessed it, and what actions they took. Single sign-on (SSO) and multi-factor authentication (MFA) also aid with user account management by enforcing standard procedures for account creation, modification, and deletion.
To combat the widespread use of weak passwords, organizations should use IAM solutions like multi-factor authentication. According to a study from last year, people are to blame for 82% of all security breaches. Whether it’s through the use of stolen credentials, phishing, abuse, or a plain mistake, people continue to play a big role in incidents and breaches. In order to satisfy compliance and regulatory requirements, organizations might benefit from deploying MFA to safeguard user accounts from cybercriminals.
Compliance with regulations and protection of consumer information are both facilitated by a well-implemented IAM system. By streamlining the process of conforming to compliance and regulatory mandates, IAM solutions help organizations save both time and money. IAM solutions allow organizations to meet their regulatory requirements while focusing on their core competencies.
Image by cottonbro studio via Pexels
Compliance and regulatory requirements are of utmost importance for businesses. Implementing IAM solutions can offer a simple and effective solution to meet these demands. Partnering with a respected identity management company ensures that your IAM solution is tailored to your unique needs. It also ensures that your IAM solution remains updated and delivers optimal results.
The right IAM solution can enable your business to meet all regulatory requirements while safeguarding your customers’ sensitive data. By addressing access control, audit trails, and user management, IAM solutions can provide comprehensive protection. They will improve your overall cybersecurity posture. Keeping up with compliance requirements can feel overwhelming. However, implementing the appropriate IAM solution can help you stay on top of things and concentrate on expanding your business.
RELATED ARTICLE: HOW TO CHOOSE THE BEST SOFTWARE SOLUTIONS FOR YOUR BUSINESS
The post Satisfy Regulatory Requirements Easily with IAM Solutions appeared first on Business Opportunities.