
2019 Digital Identity Progress Report
Schools out for summer? Well not quite. Unless you're living in the east coast of Australia, it's looking decidedly bleak weather wise for most of Europe and the American east coast. But I digress. Is it looking bleak for your digital identity driven projects? What's been a success, where are ... Read More

Renewable Security: Steps to Save The Cyber Security Planet
Simon Moffatt | | containers, DEVOPS, enterprise security, iot, microservices, serverless, three r's, triple r's
Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of being able to re-spin particular services to a known “safe” state after breach, or even as a preventative ... Read More

12 Steps to Zero Trust Success
Simon Moffatt | | 2-factor authentication, access management, authorization, Cyber Security, identity management, trust zero, zero trust
A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term coined by analyst group Forrester back in 2010 and has gained popularity since Google started using the ... Read More

Cyber Security Skills in 2018
Last week I passed the EC-Council Certified Ethical Hacker exam. Yay to me. I am a professional penetration tester right? Negatory. I sat the exam more as an exercise to see if I “still had it”. A boxer returning to the ring. It is over 10 years since I passed ... Read More

The Role Of Mobile During Authentication
Simon Moffatt | | Authentication, behavioural, context, MFA, Mobile, Multi-Factor Authentication, security bloggers network
Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app. Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step ... Read More