Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app. Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step verification. There are lots more […]
No Category
Thought Leadership Insight and Whitepapers The Cyber Hut is specialised in emerging Cyber Security and Identity and Access Management technologies, delivering a range of first-party research and insight products. Guest articles The Cyber Hut can be commissioned for guest articles on a range of topics, concept introductions and use case analysis. get started narrative series […]
No Category
Community Building Video Content The Cyber Hut provides a unique foundation for industry and category defining webinars and video material that leading Cyber Security and Identity and Access Management vendors use for community enablement. Interviews Founders and vendor executives can be interviewd by specialist analysts to undercover the mission and vision behind emerging technology. get […]
Next week our founder Simon Moffatt will be hosting two panels at the Future Identity Festival in London. The two day event hosted an array of stages focused on financial services and fraud, identity and access management and fintech solutions – with a broad array of sponsors and suppliers too. Simon will be hosting two […]
Our founder Simon Moffatt will be presenting a keynote talk at the inaugural ID Underground Summit in Denver on Oct 6-7th 2025. The Identity Underground is described as “..an exclusive, tight-knit network of CXOs and technology practitioners focusing on innovation in identity security. The global network provides unique access to thought leaders committed to advancing […]
Our next industry webinar will be taking place on September 17th at 4pm UK time, where our founder Simon Moffatt will be in conversation with Ian Ahl, CTO at Permiso.
They'll be taking a deep dive into the world of holistic identity security, that covers both human and non-human identities.
Trust is an omnipresent concept in the B2E, B2C and non-human identity worlds – where the paradox of ideas like zero trust, personalised experiences and secure-by-design are common. But one area that is fundamental to the delivery of APIs, data and applications is the underlying infrastructure – the storage, compute power, networking and now more […]
Join us for our next industry webinar taking a look at the rise of the vitally important sector focused on non-human identities. NHIs have risen in both volume and variety in recent years - and with the combination of cloud migrations and hybrid deployments, have become a major attack vector for adversarial activity.
No Category
Coming q1 2025 IAM at 2035: A Future Guide to Identity Security Order Now IAM at 2035: A Future Guide to Identity Security. Identity is more vital than ever before. Empowering organisations to improve productivity, security and revenue. However, it is fragmented and has become an attack vector for adversarial activity. After 250+ interviews over […]
Some concepts to assist with improving security of an identity and access management fabric.