Thought Leadership Insight and Whitepapers

The Cyber Hut is specialised in emerging Cyber Security and Identity and Access Management technologies, delivering a range of first-party research and insight products.

Guest articles

The Cyber Hut can be commissioned for guest articles on a range of topics, concept introductions and use case analysis.

narrative series

A collection of content artefacts can be used to help strategically develop new categories or design patterns as part of a series of articles.

whitepapers

Longer read white papers can be commissioned to help define a sector or migration approach for emerging technologies.

guides

The Cyber Hut have a developed a range of market guides, buyer guides, adoption and migration frameworks.

Recent Industry Insight

Stale access, stale risk: is Continuous Identity the answer?

A discussion on the need for a more continuous approach to identity and access management that can incorporate contextual information to allow a more dynamic and responsive foundation.

Whitepaper: A Market Guide to Identity Security Posture Management (ISPM): The Role of Data-Centric Identity Observability

A long read market guide looking at ISPM and the role of data as a catalyst for improvements to productivity, compliance and security. Contains requirements, capabilities, use cases and getting started recommendations

Security Starts When Authentication Ends: Analysing Application Activity

This is the second in a three part series taking a look at the rise of pre-emptive identity security and the need to detect and disrupt adversarial attack activity before it completes. The first article introduced the concept

Why PAM Needs to Evolve

An article on how privileged access management has and needed to evolve a static on-premises focus to more identity-centric covering a range of systems and accounts.

Migrating to Data-Centric ISPM

As many identity governance and administration projects turn to distress, the rise of ISPM and other hygiene related initiatives help to support continuous compliance use case. By adopting a more data-centric approach, improved integrated, visibility and risk reduction is possible ultimately allowing for a more preventative security model.

Siloes of Failure: Identity as a Unifying Control

An article discussing how organisations have to support more identities, more identity types across an ever increasing hybrid environment – resulting in isolated technology stacks with controls that are too linear and coarse grained. The article amplifies how identity can be a foundational security strategy through continual monitoring and response.

Identity as a Big Data Problem

An article discussing how identity and access management is moving towards being a big data problem – with a need for the correlation and normalisation of a variety of data sources in order to support posture management and hygiene use cases.

Defining and securing privileged access in modern environments

This is the second of a three-part series looking at modern privileged access management and how its evolution to the protection of more systems and more identities leads to security and productivity improvements. Article 1 discussed why PAM needs to evolve. In this article, I will summarise some of the key capabilities needed to make that a reality.

From static to smart: building Continuous Identity

This is the second of a three-part series taking a look at continuous identity. The first article introduced the concept of continuous identity and the role it can play in solving some of the fundamental issues with traditional identity management that is often built upon static assumptions.

Trusted Computing The Role of Infrastructure IAM

An article discussing the rise of specialist identity and access management capabilities that can handle the variety of interactions with compute, storage and network processing power. The use of software attestation, cryptographic identities and a broad array of protocol support is critical.

Whitepaper: Toward Converged Identity Assurance

In partnership with The Cyber Hut, HYPR has developed a market position with respect to Converged Identity Assurance – linking authentication and assurance.

Whitepaper: Authorization Buyer’s Guide

In partnership with The Cyber Hut, PlainID has developed a Buyer’s Guide to serve as a map for the journey of purchasing through implementing a solution that’s right for your business.

eBook: Build -v- Buy for Externalized Authorization

A long read whitepaper / eBook for the evaluation of externalized authorization technology – looking at the evolution, capabilities and decision making criteria as they pertain to both homegrown and commercial off the shelf authorization platforms.