So in this respect how does a workload differ from a machine? Well machines will typically be host centric and operating system related. That could be anything from bare metal servers (remember those?) right through to more specific devices working in the IoT, industrial IoT, aviation, transport or medical spaces....
This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role of identity and access management appears in more ways than previous and often in slightly less obvious ways.
Next week the Chartered Institute of Information Security live event comes to Manchester - and home of Manchester City football club at the Etihad Stadium. This full day event will bring together cyber security leaders and experts from across the UK, for a day of presentations, panels, case studies and vendor interaction.
This week our founder Simon Moffatt will be presenting at a C-level round table being held […]
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for us as humans than ever before - as employees, customers and citizens.
Our founder Simon Moffatt will be speaking at FIDO Authenticate 2023 in Carlsbad San Diego October 16-18th. This three-day auth-fest will see the world's authentication, authorization and identity experts converge for some deep dive discussions and networking on a broad array of topics - from passkeys and biometrics, through to proofing and access control.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
Join us on Sept 27th for our latest industry webinar. We will be launching our latest industry report on Identity Threat Detection and Response, as well as hosting an industry panel of global identity and access management experts and leaders, to discuss the threats to our critical IAM infrastructure.
MANCHESTER, UNITED KINGDOM, August 22, 2023 — The Cyber Hut, a leading boutique industry analyst and […]
Join us on August 22nd at 4pm UK time for our latest industry webinar where our founder Simon Moffatt will be in conversation with Alex Bovee - CEO at ConductorOne, a leader in identity centric security. Identity Governance and Administration has been with us over 2 decades - yet the problem statement it tries to solve gets larger and the solution set continues to innovate.