Evolution to Detective Identity Security

Evolution to Detective Identity Security

| | Opinion, vendor
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations ...
Identities and IAM Trends: Q&A With a Saviynt Identity Expert

Identities and IAM Trends: Q&A With a Saviynt Identity Expert

Author: Ehud Amiri, SVP Product Management, Savyint How will the threat to identities change over the coming year? AI will […] ...
Too Many IDPs: Why Now, How to Rationalize?

Too Many IDPs: Why Now, How to Rationalize?

| | events, vendor
Join us later in March for our next industry webinar we’ll be discussing the rise of identity provider sprawl – what it is, why it has happened, the impacts and more importantly ...
Trusted Computing: Emergence of a Vital Sector

Trusted Computing: Emergence of a Vital Sector

| | Opinion, vendor
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that ...
Addressing Blind Spots in Identity Security for 2025

Addressing Blind Spots in Identity Security for 2025

| | events, vendor
Join us for our first industry webinar of 2025: Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025. Our founder Simon Moffatt will be in conversation with Silverfort CEO Hed ...
Machine Identity 101

Machine Identity 101

| | Opinion, vendor
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, ...
GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs  

GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs  

Today Apptega announces a partnership with GBQ Partners LLC (GBQ), a top 100 tax, accounting and consulting firm headquartered in Columbus, OH. This partnership will enable GBQ to leverage Apptega’s end-to-end platform ...
PingZero: Passwordless is Here

ForgeRock and Ping Identity Capability Comparison Matrix

| | Opinion, vendor
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that ...
audits, cybersecurity audits, compliance, security, risk-based authentication, software audit API AuditBoard Adds Ability to Assess Third-Party Risks

Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution

If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...
Security Boulevard
supply chains, audits, configuration drift, security, supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain

Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...
Security Boulevard