A review of some interesting briefings and tools found at Blackhat EMEA 2024.
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed fundamentally over the past 5 years – expanding into customers, citizens, non-humans and machines – IAM has become a prize-winning target for adversarial […]
Later in the month, our founder Simon Moffatt, will host a webinar panel discussing the rise of NIS2 - what it is, how it impacts identity and security controls and risk management and what pragmatic steps organisations can take to become compliant.
Our founder Simon Moffatt will be a panellist at the Think Digital Identity and Cyber Security for Government event next week in London. The adoption of Post Quantum Cryptography (PQC) is a huge concern for organisations in both the public and private sectors. As the role of cryptography has risen in the past decade its […]
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry discussion around what it is, what it isn’t, which vendors deliver it, what do they actually deliver and so on. To that end, […]
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces.
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
A discussion on how role based access control may still deliver business value, if deployed in a slightly different way.
No Category
Assessment and Advisory for Cyber Security and IAM Solution Providers Receive voice of the customer, use case analysis and market positioning support to help product integration and improve client value. The What Iterative analysis, comment and feedback on pitch and position, product demonstration and go to market strategy. The Benefits Independent expert comment on product […]