Identity Management is Evolving The Cyber Hut is singularly focused on the global identity and access management market. Whether you are procuring a passwordless MFA solution, analysing the market for identity proofing for future investment or seeking the latest authorization startup design patterns, The Cyber Hut will have an opinion.  Some of the technology areas we […]
By Simon Moffatt In the above figure we describe the basic life cycle for consumer identity and access management as containing 9 distinct stages: OnboardingProofingSecure LoginDevice BindingContextual & Adaptive AccessProfile ManagementConsent ManagementData ManagementAccount Removal A basic linear flow typically occurs, where Onboarding would clearly occur before Profile Management. But some aspects can be more modular […]

This week Google announced the general availability of their “planet scale” zero trust solution for the corporate environment, called BeyondCorp Enterprise.

BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model – away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.

This post is only available to members.
By Simon Moffatt. The last 6 months has seen some interesting innovation occur within the privacy and data security spaces. It seems some specific decoupling of end to end encryption, privacy vaulting and data centric security is starting to occur. Why is this interesting? Typically organisations have tackled the privacy situation using two pretty large […]
The UK government opened an industry call for consultation in November 2020, regarding the protection of some 17 key industry sectors with regards to foreign investment. Those seventeen areas cover sectors such as robotics, AI, cryptography, civil nuclear, energy, transport and biology amongst others. Foreign Direct Investment (FDI) cranked upwards of $750 billion in the […]
We’ve been there; got the security t-shirt. Being qualified isn’t just to show we know what we’re talking about. It helps us to understand what is being asked of by the profession. It helps us to understand, what our clients are working towards, the language they use and the challenges they are facing. We contribute back […]
Pay as you go Identity security research reports Impartial. Specialist. Impactful. The Cyber Hut performs detailed research projects covering unique perspectives on mergers, funding and technology trends. These projects typically occur quarterly and are available to purchase as long read pieces of research, each roughly 60-80 pages in length. PAYG Purchase research as you need it, […]
Who Are You? Let us start with you. The Cyber Hut works with both buy side practitioners working within industry and sell side vendors delivering identity and access management security solutions and technology.  We also support venture capitalist investors too.  You are all on a mission to improve security without impacting usability, for a varied range […]
Enjoy free weekly industry analysis and comment. Join hosts Simon Moffatt and David Mahdi on The Week in Identity podcast – where they dive into the world of identity, cyber, risk and data security – and provide independent industry analysis and insight. Listen Now Latest Self-Paced Training -> Learn how to design, build and assess […]
This article takes a look at funding into the identity and access management vendor space between January and June 2020. The focus is global and the sector definition is quite broad and based on the categories Crunchbase use. Funding decreased by over $130 million between 2019 and 2020 – likely a result of global uncertainty generated by […]