Coming q1 2025 IAM at 2035: A Future Guide to Identity Security Order Now IAM at 2035: A Future Guide to Identity Security. Identity is more vital than ever before. Empowering organisations to improve productivity, security and revenue. However, it is fragmented and has become an attack vector for adversarial activity. After 250+ interviews over […]
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed fundamentally over the past 5 years – expanding into customers, citizens, non-humans and machines – IAM has become a prize-winning target for adversarial […]
Later in month, our founder Simon Moffatt will be in conversation with Mickey Martin, VP Presales at PlainID, where they'll be chatting about the rise of identity-centric security and the critical role of authorization.
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces.
A discussion on modern identity governance and administration requirements and why many projects are in distress.
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution providers from each world are starting to add in "lite" functions from each others feature set.
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view.
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for us as humans than ever before - as employees, customers and citizens.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
MANCHESTER, UNITED KINGDOM, August 22, 2023 — The Cyber Hut, a leading boutique industry analyst and advisory firm focused on the global identity and access management market, announced today it has released a new research report. “Identity Threat Detection & Response: Emerging Market Review” is a 39 page report focused on the most recent developments […]