What Identity Security Isn’t
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry discussion around what it is, what it isn’t, which vendors deliver it, what do they actually deliver and ... Read More
Hardware, Software & People: Why All Identities Need a Life Cycle
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces. The post Hardware, Software & People: Why All Identities Need a Life Cycle appeared first on The Cyber Hut ... Read More
Identity Data Automation: The What and Why
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The What and Why appeared first on The Cyber Hut ... Read More
Is IGA in Distress? If So Why?
A discussion on modern identity governance and administration requirements and why many projects are in distress. The post Is IGA in Distress? If So Why? appeared first on The Cyber Hut ... Read More
Are PAM and IGA Converging?
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution providers from each world are starting to add in "lite" functions from each others feature set. The post ... Read More
Workload Identity or Non-Human Identity?
We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity". The post Workload Identity or Non-Human Identity? appeared first on The Cyber Hut ... Read More
Poll Result: Is Passwordless the Big Ticket Item for 2024?
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view. The post Poll Result: Is Passwordless the Big Ticket Item for 2024? appeared first on The Cyber Hut ... Read More
What’s The Difference Between Machine and Workload Identity?
So in this respect how does a workload differ from a machine? Well machines will typically be host centric and operating system related. That could be anything from bare metal servers (remember those?) right through to more specific devices working in the IoT, industrial IoT, aviation, transport or medical spaces ... Read More
Blackhat EMEA 2023 Review
This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role of identity and access management appears in more ways than previous and often in slightly less obvious ways ... Read More
Machine Identity 101
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for ... Read More