
Evolution to Detective Identity Security
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations and IAM related vendors have supported a model of security controls embedded within particular point solution spaces. Concepts ... Read More

Trusted Computing: Emergence of a Vital Sector
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that is fundamental to the delivery of APIs, data and applications is the underlying infrastructure – the storage, compute ... Read More

Review of Blackhat EMEA 2024
A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut ... Read More

Identity Security: What Next?
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed fundamentally over the past 5 years – expanding into customers, citizens, non-humans and machines – IAM has become ... Read More

What Identity Security Isn’t
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry discussion around what it is, what it isn’t, which vendors deliver it, what do they actually deliver and ... Read More

Hardware, Software & People: Why All Identities Need a Life Cycle
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces. The post Hardware, Software & People: Why All Identities Need a Life Cycle appeared first on The Cyber Hut ... Read More

Identity Data Automation: The What and Why
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The What and Why appeared first on The Cyber Hut ... Read More

Is IGA in Distress? If So Why?
A discussion on modern identity governance and administration requirements and why many projects are in distress. The post Is IGA in Distress? If So Why? appeared first on The Cyber Hut ... Read More

Are PAM and IGA Converging?
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution providers from each world are starting to add in "lite" functions from each others feature set. The post ... Read More

Workload Identity or Non-Human Identity?
We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity". The post Workload Identity or Non-Human Identity? appeared first on The Cyber Hut ... Read More