This week saw the London edition of Infosec Europe - essentially a smaller version of the RSA Conference a few week ago in San Francisco. There were about 15,000 attendees and 300+ solution providers from a range of cyber and information security areas. Of course my primary interest was to get briefings and understand the viewpoint from an identity and access management perspective and see how far the tentacles of identity were now spreading into other orthogonal areas of security. It didn't disappoint and I had some thought provoking conversations...
An introduction to authorization startup Aserto.
June 2022 sees the launch of The Cyber Hut’s brand new podcast – “The Week in […]
What is driving the demand for new authorization models, software vendors and emerging authorization design patterns? This discusses previous failures of RBAC and XACML as well as modern architecture patterns such as identity centricity and the business mesh.

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas. I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response.

All four areas have had significant venture capitalist funding over the past 36 months and the use cases and capabilities of each have started to stabilise to a point where buy side procurement and integration is becoming consistent and vendors are identifying their competitive go to market narratives.

So my poll was essentially asking, which of these areas would a buy-side practitioner look to invest in during 2022?

Join our founder Simon Moffatt on June 14th for a free 60 minute webinar taking a […]
Vendor introduction report covering oort.io - an emerging vendor in the Identity Threat Detection and Response sector.
A few interesting items to hit The Cyber Hut intelligence inboxes over the past couple of […]
An independent vendor assessment of Axiomatics, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
An independent vendor assessment of Styra, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.