Thought Leadership Insight and Whitepapers
The Cyber Hut is specialised in emerging Cyber Security and Identity and Access Management technologies, delivering a range of first-party research and insight products.
Guest articles
The Cyber Hut can be commissioned for guest articles on a range of topics, concept introductions and use case analysis.
narrative series
A collection of content artefacts can be used to help strategically develop new categories or design patterns as part of a series of articles.
whitepapers
Longer read white papers can be commissioned to help define a sector or migration approach for emerging technologies.
guides
The Cyber Hut have a developed a range of market guides, buyer guides, adoption and migration frameworks.
Recent Industry Insight
Unified by Design: Consolidating Access Across Physical and Digital Realms
How can organisations look to design more converged access flows that cover the physical and digital realms? From better integrations to auth source data, do improvements in credential management, productivity, security and compliance can be optimized.
From Anonymous to Accountable: Giving AI Agents a Digital Identity
As the rise of AI agents continues, we need to consider how we can replace long lived and often static credentials used for authentication to something more verifiable and grounded in strong cryptography.
Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance
An analyst comment on the structural issues associated with disconnected digital and physical enterprise login and access infrastructure.
Pre-Emptive Identity Security: Getting Started
A deep dive getting started guide with respect to pre-emptive identity security – and the ability to apply identity risk and threat analysis techniques to a range of identity types and scenarios.
Stale access, stale risk: is Continuous Identity the answer?
A discussion on the need for a more continuous approach to identity and access management that can incorporate contextual information to allow a more dynamic and responsive foundation.
Whitepaper: A Market Guide to Identity Security Posture Management (ISPM): The Role of Data-Centric Identity Observability
A long read market guide looking at ISPM and the role of data as a catalyst for improvements to productivity, compliance and security. Contains requirements, capabilities, use cases and getting started recommendations
Whitepaper: A Market Guide to Securing the Production Stack
A long read market guide that articulates the transition being seen with respect to privileged access management. This guide covers the history, requirements, use cases, market considerations and getting started stages.
The Unified Identity Imperative: Breaking the Cycle of Fragmentation
Many organisations face considerable productivity and security inefficiencies due to a highly fragmented and disconnected technology landscape. This analyst comment discussed how to identify and remeidate this problem.
Security Starts When Authentication Ends: Analysing Application Activity
This is the second in a three part series taking a look at the rise of pre-emptive identity security and the need to detect and disrupt adversarial attack activity before it completes. The first article introduced the concept
Whitepaper: Vendor Assessment or Radiant Logic
Long read technical and go to market assessment of modern ISPM vendor Radiant Logic. The report covers what they do, how they do it, market position and analyst comment and summary.
Why PAM Needs to Evolve
An article on how privileged access management has and needed to evolve a static on-premises focus to more identity-centric covering a range of systems and accounts.
Migrating to Data-Centric ISPM
As many identity governance and administration projects turn to distress, the rise of ISPM and other hygiene related initiatives help to support continuous compliance use case. By adopting a more data-centric approach, improved integrated, visibility and risk reduction is possible ultimately allowing for a more preventative security model.
Siloes of Failure: Identity as a Unifying Control
An article discussing how organisations have to support more identities, more identity types across an ever increasing hybrid environment – resulting in isolated technology stacks with controls that are too linear and coarse grained. The article amplifies how identity can be a foundational security strategy through continual monitoring and response.
Identity as a Big Data Problem
An article discussing how identity and access management is moving towards being a big data problem – with a need for the correlation and normalisation of a variety of data sources in order to support posture management and hygiene use cases.
Defining and securing privileged access in modern environments
This is the second of a three-part series looking at modern privileged access management and how its evolution to the protection of more systems and more identities leads to security and productivity improvements. Article 1 discussed why PAM needs to evolve. In this article, I will summarise some of the key capabilities needed to make that a reality.
From static to smart: building Continuous Identity
This is the second of a three-part series taking a look at continuous identity. The first article introduced the concept of continuous identity and the role it can play in solving some of the fundamental issues with traditional identity management that is often built upon static assumptions.
Trusted Computing The Role of Infrastructure IAM
An article discussing the rise of specialist identity and access management capabilities that can handle the variety of interactions with compute, storage and network processing power. The use of software attestation, cryptographic identities and a broad array of protocol support is critical.
Whitepaper: Toward Converged Identity Assurance
In partnership with The Cyber Hut, HYPR has developed a market position with respect to Converged Identity Assurance – linking authentication and assurance.
Whitepaper: Authorization Buyer’s Guide
In partnership with The Cyber Hut, PlainID has developed a Buyer’s Guide to serve as a map for the journey of purchasing through implementing a solution that’s right for your business.
eBook: Build -v- Buy for Externalized Authorization
A long read whitepaper / eBook for the evaluation of externalized authorization technology – looking at the evolution, capabilities and decision making criteria as they pertain to both homegrown and commercial off the shelf authorization platforms.