Pepsi PBV data breach deep fakes Astoria Company hack

Will Consumers Punish Vendors That Suffer a Data Breach?

If a new survey from API and application protection vendor ThreatX is accurate, a majority of U.S. consumers are less likely to work with a company following a data breach. At least, ...
Security Boulevard
What Should Thoma Bravo Do With ForgeRock?

What Should Thoma Bravo Do With ForgeRock?

| | Opinion, Polls
An opinion piece analysing the potential acquisition of ForgeRock by private equity firm Thoma Bravo. The post What Should Thoma Bravo Do With ForgeRock? appeared first on The Cyber Hut ...
Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

| | Opinion, vendor
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption. The post Out of the Big Cloud 3 ...
Poll Result: What is Your Favourite Biometric Authentication Option?

Poll Result: What is Your Favourite Biometric Authentication Option?

| | Opinion
As part of The Cyber Hut's anecdotal community polls, we asked as an end user, what is your favourite biometric authentication option? The rise of device specific biometry to unlock our Android ...
Poll Result: Which Identity Component Will Die in 2023?

Poll Result: Which Identity Component Will Die in 2023?

| | Opinion
Each year a particular standard, component, model or approach within the identity and access management will be declared "dead" by expert commentators, startup vendors or just the bloke in the pub. As ...

2022: A Year in Review

| | Opinion
I wanted to wrap up 2022, with an anecdotal look at some of the key facts and figures that made up the bulk of The Cyber Hut's interactions, research and community engagement ...

The Network and Information Systems Regulations – The What and The Why

| | Opinion
The next NIS-D directive is live in a second iteration and regulators of Critical National Infrastructure (CNI) across Europe are working to evaluate and adapt the directive to country specific regulations. Thus, ...
Poll Result: Would You Pay for Privacy?

Poll Result: Would You Pay for Privacy?

| | Opinion
Two weeks ago we ran another of our LinkedIn polls, querying the cyber, identity and access management community around a perennial question the industry has yet to consistently provide an answer for ...
Comment: US Department of Defense Zero Trust Reference Architecture 2.0

Comment: US Department of Defense Zero Trust Reference Architecture 2.0

| | Opinion
Zero Trust has been with us for the best part of a decade - since the likes of the Jericho Forum, Google's Beyond Corp and ex-Forrester analyst John Kindervag have all promoted ...
SGNL Just-in-Time Access Management

Vendor Introduction: sgnl.ai

| | Opinion, vendor
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ...