Join our founder Simon Moffatt in our next industry webinar, where he will be in conversation with cloud identity governance and administration provider Omada on the concept of cloud IGA.
Identity Governance and Administration is now entering a new age – where the IGA problem statement has evolved, the opportunity to innovate and improve productivity are all around, yet many organizations are struggling with fragile and static on-premises IGA technologies built for yesterday’s problems.
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption.
Over a 4 week period I asked the preferred deployment model option for four key identity and access management services: consumer identity, workforce access management, identity governance and administration and privileged access management.
The results where subtle and nuanced.
A few items to appear in The Cyber Hut intelligence inboxes this week. Styra Launches Cloud Native Entitlements Solution Styra, the authorization startup behind Open Policy Agent, recently announced another solution to their kit bag. Their Cloud Native Entitlements approach seems to be aimed at bringing a distributed and replicated approach to entitlements management – […]
Google provides a range of cloud related identity and access management services. Let’s take a look at the release note updates between January 1st 2019 and December 31st 2019. The full release notes page is available here. Google Cloud IAM provides “Fine-grained access control and visibility for centrally managing cloud resources.”. The basic feature list […]
This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations and IAM related vendors have supported a model of security controls embedded within particular point solution spaces. Concepts such as MFA, credential vaulting, […]
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that is fundamental to the delivery of APIs, data and applications is the underlying infrastructure – the storage, compute power, networking and now more […]
Join us for our next industry webinar taking a look at the rise of the vitally important sector focused on non-human identities. NHIs have risen in both volume and variety in recent years - and with the combination of cloud migrations and hybrid deployments, have become a major attack vector for adversarial activity.