Poll Result: Would You Pay for Privacy?

Poll Result: Would You Pay for Privacy?

| | Opinion
Two weeks ago we ran another of our LinkedIn polls, querying the cyber, identity and access management community around a perennial question the industry has yet to consistently provide an answer for - in both user behaviour and technical solutions - "would you pay for privacy?". The post Poll Result: ... Read More
Comment: US Department of Defense Zero Trust Reference Architecture 2.0

Comment: US Department of Defense Zero Trust Reference Architecture 2.0

| | Opinion
Zero Trust has been with us for the best part of a decade - since the likes of the Jericho Forum, Google's Beyond Corp and ex-Forrester analyst John Kindervag have all promoted a view of moving the concept of "trust" from a location to a concept based on the identity, ... Read More
SGNL Just-in-Time Access Management

Vendor Introduction: sgnl.ai

| | Opinion, vendor
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ... Read More
The Cyber Hut CISO Briefing Nov 2022: Next Generation Authorization

CISO Briefing: Next Generation Authorization

| | events
Homegrown access control is limiting business agility - the ability to share data with those who need it, engage in joint ventures and B2B partnerships, protect PII and open up APIs to employees and customers alike. As such the market for authorization has increased substantially in the last 36 months ... Read More
Research Poll Results: Are All Identity Services Cloud Delivered?

Research Poll Results: Are All Identity Services Cloud Delivered?

| | Opinion
Over a 4 week period I asked the preferred deployment model option for four key identity and access management services: consumer identity, workforce access management, identity governance and administration and privileged access management. The results where subtle and nuanced. The post Research Poll Results: Are All Identity Services Cloud Delivered? ... Read More

Authenticate 2022: A Review

| | events, Opinion
This week saw the FIDO Authenticate conference take place in Seatle. I attended via the virtual remote route, going through the vast majority of the sessions from the comfort of the office. A few items that stood out for me. The post Authenticate 2022: A Review appeared first on The ... Read More

5 Questions to Ask Your Passwordless Authentication Vendor

| | Opinion, vendor
Passwordless authentication is often described as improving both the usability and security aspects of both the employee and customer identity journeys. Many approaches to passwordless have emerged over the last 5 years - including hardware, software, biometric and standards based initiatives. In November 2021, The Cyber Hut released a 61 ... Read More
An Introduction to IDQL: A Language for Identity Orchestration

An Introduction to IDQL: A Language for Identity Orchestration

| | Opinion, vendor
Let us start with the basics. IDQL stands for Identity Query Language. The description given to it from the Hexa website (I'll come back to Hexa in a minute) is "Identity Query Language (IDQL) is a declarative access policy and set of APIs that enables the mapping of a centrally ... Read More
IAM Deployment Model Definitions

IAM Deployment Model Definitions

| | Opinion
Even as many organisations are moving to a "cloud first" strategy for the consumption of new applications and services, the cloud line is blurred. Not all services can be consumed in a pure cloud setting, and not all "clouds" are the same. Any analysis in the popularity, options or strategy ... Read More
Poll: Where Will AI/ML Have The Biggest Benefit in IAM?

Poll: Where Will AI/ML Have The Biggest Benefit in IAM?

| | Opinion
Our latest LinkedIn poll on September 27th was focused on understanding the role and impact of artificial intelligence and machine learning (AI/ML) technology on the general identity and access management industry. The post Poll: Where Will AI/ML Have The Biggest Benefit in IAM? appeared first on The Cyber Hut ... Read More

Secure Guardrails