inbox updates 

Receive regular vendor, market and industry articles

expert insight

Expert analysis and insight on a range of industry topics

discounted reports

Receive discounts on research reports

Join Us – become a member

Receive regular specialist research 
and insight 

Becoming a member of The Cyber Hut allows access to specialist insight on vendor, market and architectural topics, regularly updated and delivered straight to your inbox.

Impartial deep insight to help make more informed decisions regarding product design, investment and cyber security architecture.

Articles cover Vendor Intelligence, Market Intelligence and CISO Briefings and are released between 2-4 times a month. Opinion pieces are always free.

Becoming a member, also allows purchase of long read research at a discount.

Members Only Content

The latest cyber security industry research covering CISO architecture, vendor and market insight.

This category can only be viewed by members.
By Simon Moffatt. The last 6 months has seen some interesting innovation occur within the privacy and data security spaces. It seems some specific decoupling of end to end encryption, privacy vaulting and data centric security is starting to occur. Why is this interesting? Typically organisations have tackled the privacy situation using two pretty large […]
This post is only available to members.
What is persona based selling? What is persona based selling? Different people buy different things. A fairly obvious statement, but […]
This post is only available to members.
This article takes a look at funding into the identity and access management vendor space between January and June 2020. […]
This post is only available to members.
This week privileged access management vendor CyberArk completed the acquisition of SaaS identity and access player Idaptive. The price was […]
This post is only available to members.
The Covid-19 pandemic, has had far reaching impacts on global economic performance. Economic output in many countries is down, with […]
This post is only available to members.
Amazon provides identity and access management services, under the product name of Cognito. “Amazon Cognito lets you add user sign-up, […]
This post is only available to members.
As part of the league table series, this article takes an alternative look at some of the top vendors in […]
This post is only available to members.
Beyond Identity came out of relative stealth mode recently, with the announcement of a $30 million series A investment from […]
This post is only available to members.
Introduction Consumer Identity Services, are focused upon delivering functions such as the following for users accessing services across the internet: […]
This post is only available to members.
The following is a high level capabilities matrix for OAuth2. The vendors chosen for comparison, are a selected few, that […]
This post is only available to members.
Okta recently released their 10K filing for the 2019 financial year with the Securities and Exchange Commission. The following contains […]
This post is only available to members.
Ping Identity recently filed their SEC 10K for the fiscal year ending December 31st 2019. The below figures and quotes […]
This post is only available to members.
The world’s most popular websites [1], according to the Alexa website are the following: SiteDaily Time on Site (mins:secs)Daily Pageviews […]
This post is only available to members.
The W3C backed standard for passwordless authentication, commonly known as WebAuthn, has been worked on by experts from the likes […]
This post is only available to members.
Sailpoint’s latest quarterly report, as filed with the SEC was released in November 2019. Let’s take a look inside. As […]
This post is only available to members.
Google provides a range of cloud related identity and access management services. Let’s take a look at the release note […]
This post is only available to members.
6 Minute Read.Let us start with some brief definitions to get us all on the same page. Firstly – what […]
This post is only available to members.
Back in July, I wrote an article taking a brief look at venture capitalist funding patterns within the identity and […]
This post is only available to members.
When it comes to cyber security design, there have been numerous ways of attempting to devise the investment profile and […]
This post is only available to members.
I want to talk about the age old trade off between the simplicity of a website or app, versus the […]
This post is only available to members.
As the first half of 2019 has been and gone, I’ve taken a quick look at the funding rounds that […]
This post is only available to members.
Many of today’s security models spend a lot of time focusing upon network segmentation and authentication.  Both of these concepts […]
This post is only available to members.
Today’s authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an […]
This post is only available to members.
Schools out for summer?  Well not quite.  Unless you’re living in the east coast of Australia, it’s looking decidedly bleak […]
This post is only available to members.
Triple R’s of Security What are the “3 R’s of Security”?  A quick Google on that topic will result in […]
This post is only available to members.
A Google search for “zero trust” returns ~ 195Million results.  Pretty sure some are not necessarily related to access management […]
This post is only available to members.
Last week I passed the EC-Council Certified Ethical Hacker exam.  Yay to me.  I am a professional penetration tester right?  […]
This post is only available to members.
Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or […]
This post is only available to members.
Information Security and Innovation: often at two different ends of an executive team’s business strategy. The non-CIO ‘C’ level folks […]
This post is only available to members.
Welcome to a digital identity project in 2020! You’ll be expected to have a plan for post-quantum cryptography.  Your network […]
This post is only available to members.