This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role of identity and access management appears in more ways than previous and often in slightly less obvious ways.
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for us as humans than ever before - as employees, customers and citizens.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
I wanted to expand to this based on conversations I've had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR - what it is and why it's important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
Our founder Simon Moffatt will be delivering a keynote presentation at the Heliview Identity and Access Management conference on May 23rd. The event hosted at the Omnisport Apeldoorn arena in the Netherlands boasts a great lineup of industry specialists and suppliers from the likes of Okta, Saviynt, Beyond Trust, Okta, Trust Builder, ID Veritas, Sailpoint, […]
Authentication Design & Management 1 Day Masterclass or7 Hours Self Paced Video The Why:  To provide a virtual workshop for industry leaders, practitioners and consultants looking to develop authentication systems for both B2E, B2C and IoT/Machine ecosystems. For Who:  Your Current Role: Information leader, CISO, identity architect, security architect, CIO, digital consultant Pre-Reqs: Infrastructure understanding, digital concepts, […]
Based on the Amazon Book The CIAM Market and Technology overview course is based on the best selling book “Consumer Identity & Access Management: Design Fundamentals”. Released 2021 A business focused Industry first book on consumer identity Kindle & Paperback Digital copy available for free when buying course Purchase on Amazon Consumer Identity & Access […]
I wanted to wrap up 2022, with an anecdotal look at some of the key facts and figures that made up the bulk of The Cyber Hut's interactions, research and community engagement over the past year. It has been a great year professionally and personally, yet parts of the world are still being ravaged by the pandemic, conflict, economic turmoil and the cost of living crisis. Hopefully 2023 can start to stabilise some of those broader problems we will undoubtedly all feel in the coming months. I want to take a retrospective look back at 2022 in numbers, adding in a few stories and comments as I go. I hope you enjoy it and thank you to all of the global identity and access management community who have engaged with The Cyber Hut over the past 12 months.
This week saw the FIDO Authenticate conference take place in Seatle. I attended via the virtual remote route, going through the vast majority of the sessions from the comfort of the office. A few items that stood out for me.
Expert independent industry opinion.What you need, when you need it. CISO Briefing Inquiry services provide an expert voice for a range of projects. Whether you are a looking to engage a vendor and design an RFP, perform a maturity assessment for an existing identity and access management investment or enable a team on market technologies, the CISO […]