vendor

Evolution to Detective Identity Security
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations ...

Identities and IAM Trends: Q&A With a Saviynt Identity Expert
Author: Ehud Amiri, SVP Product Management, Savyint How will the threat to identities change over the coming year? AI will […] ...

Too Many IDPs: Why Now, How to Rationalize?
Join us later in March for our next industry webinar we’ll be discussing the rise of identity provider sprawl – what it is, why it has happened, the impacts and more importantly ...

Trusted Computing: Emergence of a Vital Sector
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that ...

Addressing Blind Spots in Identity Security for 2025
Join us for our first industry webinar of 2025: Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025. Our founder Simon Moffatt will be in conversation with Silverfort CEO Hed ...

Machine Identity 101
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, ...

GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs
Today Apptega announces a partnership with GBQ Partners LLC (GBQ), a top 100 tax, accounting and consulting firm headquartered in Columbus, OH. This partnership will enable GBQ to leverage Apptega’s end-to-end platform ...

ForgeRock and Ping Identity Capability Comparison Matrix
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that ...

Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution
If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...

Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain
Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...