5 Indicators of Cyber Security Market Failure

5 Indicators of Cyber Security Market Failure

6 Minute Read. By Simon Moffatt.Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook description would be something that articulated the “inefficient distribution of goods and services in a free market”. But ... Read More
2H2019 Identity Management Funding Analysis

2H2019 Identity Management Funding Analysis

Back in July, I wrote an article taking a brief look at venture capitalist funding patterns within the identity and access management space, for the first half of 2019. I am going to revisit that topic, but for the second half of the year.Key Facts July to December 2017 / ... Read More
5 Minute Briefing: Designing for Security Outcomes

5 Minute Briefing: Designing for Security Outcomes

This is the first in a set of blogs focused on high level briefings - typically 5 minute reads, covering design patterns and meta trends relating to security architecture and design.When it comes to cyber security design, there have been numerous ways of attempting to devise the investment profile and ... Read More
Principles of Usable Security

Principles of Usable Security

I want to talk about the age old trade off between the simplicity of a website or app, versus the level of friction, restriction and inhibition associated with applying security controls. There was always a tendency to split security at the other end of the cool and usable spectrum. If ... Read More
1H2019 Identity Management Funding Analysis

1H2019 Identity Management Funding Analysis

As the first half of 2019 has been and gone, I've taken a quick look at the funding rounds that have taken place so far this year, within the identity and access management space and attempted some coarse grained analysis. The focus is global and the sector definition is quite ... Read More
Next Generation Distributed Authorization

Next Generation Distributed Authorization

Many of today's security models spend a lot of time focusing upon network segmentation and authentication. Both of these concepts are critical in building out a baseline defensive security posture. However, there is a major area that is often overlooked, or at least simplified to a level of limited use ... Read More
How To Build An Authentication Platform

How To Build An Authentication Platform

Today's authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an Id and password. Authentication and the login experience, is the application entry point and can make or break your security posture and end user experience. Authentication is typically associated with ... Read More