
5 Indicators of Cyber Security Market Failure
6 Minute Read. By Simon Moffatt.Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook ...

2H2019 Identity Management Funding Analysis
Back in July, I wrote an article taking a brief look at venture capitalist funding patterns within the identity and access management space, for the first half of 2019. I am going ...

5 Minute Briefing: Designing for Security Outcomes
Simon M | | business objectives, objectives, outcomes security, security design, strategies, tactics
This is the first in a set of blogs focused on high level briefings - typically 5 minute reads, covering design patterns and meta trends relating to security architecture and design.When it ...

Principles of Usable Security
I want to talk about the age old trade off between the simplicity of a website or app, versus the level of friction, restriction and inhibition associated with applying security controls. There ...

1H2019 Identity Management Funding Analysis
As the first half of 2019 has been and gone, I've taken a quick look at the funding rounds that have taken place so far this year, within the identity and access ...

Next Generation Distributed Authorization
Simon M | | authorization, capability based access control, distributed enforcement, machine learning
Many of today's security models spend a lot of time focusing upon network segmentation and authentication. Both of these concepts are critical in building out a baseline defensive security posture. However, there ...

How To Build An Authentication Platform
Simon M | | api, Authentication, business transformation, intelligence, MFA, modernization, passwordless, platform
Today's authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an Id and password. Authentication and the login experience, is the application entry ...

2019 Digital Identity Progress Report
Schools out for summer? Well not quite. Unless you're living in the east coast of Australia, it's looking decidedly bleak weather wise for most of Europe and the American east coast. But ...

Renewable Security: Steps to Save The Cyber Security Planet
Simon Moffatt | | containers, DEVOPS, enterprise security, iot, microservices, serverless, three r's, triple r's
Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of ...

12 Steps to Zero Trust Success
Simon Moffatt | | 2-factor authentication, access management, authorization, Cyber Security, identity management, trust zero, zero trust
A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a ...