Introducing the FOSA Strategy –
Free Open Source Analysis
The Cyber Hut are industry specialists when it comes to identity and access management. We have contributed to industry standards. Worked for the largest vendors. Designed some of the world’s biggest identity platforms.
We also want to break down the traditional model for understanding the market and technology for identity and access management. Why don’t you join us?
Free Open Source Analysis
We provide the vast majority of our analysis and insights free as open source articles as well as our Signals Project – providing a view into a range of OSINT data points to help with vendor understanding.
The Week in Identity Podcast
The Cyber Hut runs a weekly podcast – aptly named “The Week in Identity” – where we take an industry analyst view of the latest identity and access management events, funding and conference news.
We run regular CISO briefing webinars – where we take an impartial industry view of emerging technology trends or market sectors, distil them into bite-sized chunks to enable security and information leaders to make more informed technology decisions.
Trusted by Global Vendors, Integrators and Industry
The Cyber Hut has supported a range of vendor, buy side, integrator and investment clients to enhance their content, understanding and insight on the emerging identity and access management markets – through training, advisory, content and inquiry.
“The Cyber Hut is a partner in helping us build our strategy. They provide us with unique insights and custom services that help HYPR continue to lead the passwordless MFA market.”
VP Product Marketing, HYPR
“Working with Simon and team on the consumer authentication webinar was great – they provided great inputs based on deep industry knowledge and and domain expertise.”
VP Products, Sift / Keyless
“Simon at TCH is our go to point of contact for understanding the technical and business nuances of the emerging patterns in identity. Always clear, smart and insightful, but most importantly, trusted.”
“No faster way of getting into Consumer IAM, than by learning from the master himself. Great overview and best practices from Simon at The Cyber Hut. Recommended”
Founder & Principal Consultant, SonicBee
“The Cyber Hut provides insightful guidance on identity security best practices that’s backed by industry experience and in-depth research. TCH has helped us better communicate to a more relevant audience consisting of both business and security-oriented professionals.”
Senior Director, Product Marketing, PlainID
Latest Open Source Analysis, Events & Opinion
Even as many organisations are moving to a "cloud first" strategy for the consumption of new applications and services, the cloud line is blurred. Not all services can be consumed in a pure cloud setting, and not all "clouds" are the same.
Any analysis in the popularity, options or strategy with respect to IAM deployment should be firmly based against a set of basic definitions.
Join our founder Simon Moffatt on September 15th where he will join PlainID on a discussion around external authorization platforms.
The modern digital native enterprise is facing a number of emerging and incumbent challenges - from increased competition and demand for a more agile service deployment model through to needing the ability to share more data to more people, all under a competing climate of increased security threats coupled with a lower risk appetite.
Join our founder Simon Moffatt along with Michael Rothschild VP of Product Marketing at HYPR on August 22nd, where they'll be taking a look at authentication within the global financial services industry.
In this industry fireside chat webinar, Simon and Michael will take a look a the current challenges and opportunities that exist within the financial services industry as it pertains to authentication.
When on briefings and inquiry workshops there are often emerging themes that start to spring up repeatedly. Perhaps every few months, perhaps under different projects, using different terms and stories and perhaps from unexpected people or teams.
There has been one theme over the past 12 months or so that is difficult to ignore: not only how identity based security has left-shifted into the thinking of information leaders to being a first-class citizen in the technology arsenal, but how identity is moving into a new territory. The territory of autonomy.