Poll Result: Is Passwordless the Big Ticket Item for 2024?

Poll Result: Is Passwordless the Big Ticket Item for 2024?

| | Opinion, Polls
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view. The post Poll Result: Is Passwordless the Big Ticket Item for 2024? appeared first on The Cyber Hut ... Read More

What’s The Difference Between Machine and Workload Identity?

| | Opinion
So in this respect how does a workload differ from a machine? Well machines will typically be host centric and operating system related. That could be anything from bare metal servers (remember those?) right through to more specific devices working in the IoT, industrial IoT, aviation, transport or medical spaces ... Read More
Blackhat EMEA 2023 Review

Blackhat EMEA 2023 Review

| | events, Opinion
This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role of identity and access management appears in more ways than previous and often in slightly less obvious ways ... Read More
Machine Identity 101

Machine Identity 101

| | Opinion, vendor
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for ... Read More
PingZero: Passwordless is Here

ForgeRock and Ping Identity Capability Comparison Matrix

| | Opinion, vendor
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in ... Read More
2019 Digital Identity Progress Report

2019 Digital Identity Progress Report

Schools out for summer? Well not quite. Unless you're living in the east coast of Australia, it's looking decidedly bleak weather wise for most of Europe and the American east coast. But I digress. Is it looking bleak for your digital identity driven projects? What's been a success, where are ... Read More
Renewable Security: Steps to Save The Cyber Security Planet

Renewable Security: Steps to Save The Cyber Security Planet

Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of being able to re-spin particular services to a known “safe” state after breach, or even as a preventative ... Read More
12 Steps to Zero Trust Success

12 Steps to Zero Trust Success

A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term coined by analyst group Forrester back in 2010 and has gained popularity since Google started using the ... Read More
Cyber Security Skills in 2018

Cyber Security Skills in 2018

Last week I passed the EC-Council Certified Ethical Hacker exam. Yay to me. I am a professional penetration tester right? Negatory. I sat the exam more as an exercise to see if I “still had it”. A boxer returning to the ring. It is over 10 years since I passed ... Read More
The Role Of Mobile During Authentication

The Role Of Mobile During Authentication

Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app. Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step ... Read More