Evolution to Detective Identity Security

Evolution to Detective Identity Security

| | Opinion, vendor
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations and IAM related vendors have supported a model of security controls embedded within particular point solution spaces. Concepts ... Read More
Trusted Computing: Emergence of a Vital Sector

Trusted Computing: Emergence of a Vital Sector

| | Opinion, vendor
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that is fundamental to the delivery of APIs, data and applications is the underlying infrastructure – the storage, compute ... Read More
Review of Blackhat EMEA 2024

Review of Blackhat EMEA 2024

| | events, Opinion
A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut ... Read More
Identity Security: What Next?

Identity Security: What Next?

| | Opinion
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed fundamentally over the past 5 years – expanding into customers, citizens, non-humans and machines – IAM has become ... Read More
What Identity Security Isn’t

What Identity Security Isn’t

| | Opinion
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry discussion around what it is, what it isn’t, which vendors deliver it, what do they actually deliver and ... Read More
Hardware, Software & People: Why All Identities Need a Life Cycle

Hardware, Software & People: Why All Identities Need a Life Cycle

| | Opinion
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces. The post Hardware, Software & People: Why All Identities Need a Life Cycle appeared first on The Cyber Hut ... Read More
Identity Data Automation: The What and Why

Identity Data Automation: The What and Why

| | Opinion
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The What and Why appeared first on The Cyber Hut ... Read More
Is IGA in Distress? If So Why?

Is IGA in Distress? If So Why?

| | Opinion, Polls
A discussion on modern identity governance and administration requirements and why many projects are in distress. The post Is IGA in Distress? If So Why? appeared first on The Cyber Hut ... Read More
Are PAM and IGA Converging?

Are PAM and IGA Converging?

| | Opinion, Polls
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution providers from each world are starting to add in "lite" functions from each others feature set. The post ... Read More
Workload Identity or Non-Human Identity?

Workload Identity or Non-Human Identity?

| | Opinion, Polls
We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity". The post Workload Identity or Non-Human Identity? appeared first on The Cyber Hut ... Read More