Evolution to Detective Identity Security

Evolution to Detective Identity Security

| | Opinion, vendor
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations ...
Trusted Computing: Emergence of a Vital Sector

Trusted Computing: Emergence of a Vital Sector

| | Opinion, vendor
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that ...
Review of Blackhat EMEA 2024

Review of Blackhat EMEA 2024

| | events, Opinion
A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut ...
Identity Security: What Next?

Identity Security: What Next?

| | Opinion
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed ...
What Identity Security Isn’t

What Identity Security Isn’t

| | Opinion
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry ...
Hardware, Software & People: Why All Identities Need a Life Cycle

Hardware, Software & People: Why All Identities Need a Life Cycle

| | Opinion
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces. The post Hardware, Software & People: Why All ...
Identity Data Automation: The What and Why

Identity Data Automation: The What and Why

| | Opinion
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The ...
Is IGA in Distress? If So Why?

Is IGA in Distress? If So Why?

| | Opinion, Polls
A discussion on modern identity governance and administration requirements and why many projects are in distress. The post Is IGA in Distress? If So Why? appeared first on The Cyber Hut ...
Are PAM and IGA Converging?

Are PAM and IGA Converging?

| | Opinion, Polls
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution ...
Workload Identity or Non-Human Identity?

Workload Identity or Non-Human Identity?

| | Opinion, Polls
We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity". The post Workload Identity or Non-Human ...