An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Authentication does not exist in a vacuum. It does not exist in a silo. The aim of authentication, is not authentication. It exists to support secondary events such as employee application access, consumer transaction completion or purchases. That seems pretty obvious when you write it down and read it aloud. However, we still tend to […]
A few weeks ago I ran a slightly provocative and not very scientific poll on LinkedIn asking which was the more important: authentication or authorization? Clearly in the grand scheme of things that is a pretty pointless exercise, but the rationale was to really identify some thought processes and reactions. It provided some interesting responses. […]
Let us start with a few definitions just to get started. Authentication is focused upon asserting the properties of an entity and confirming a level of assurance. The typical process of signing in or logging in. Clearly authentication for people is quite a well known process, as we perform the task every day – sometimes […]
Recently I discussed how “You’re Only As Strong As Your Password Reset” – with an emphasis on how credential reset activities could well be an Achilles heel when it comes to authentication journeys. Whilst many organisations rightly start to add multi factor authentication and passwordless authentication to their arsenal of security and usability controls, it […]
Threats evolve.  So should an identity and security architecture. The Cyber Hut provides a range of support options for designing, evaluating and renewing architectures that pertain to the protection of identities, devices and high value information assets. Identity Security Design Identity Security Evaluation Identity Security Optimization Design The Cyber Hut can design and assist in […]
Technology is changing – non more so than the pervasive nature of the Internet with its connected data and devices. But how does the evolving Web 3.0 landscape affect identity – both for the individual in terms of data privacy but also in terms of integration with omnipresent devices like our mobile phones? What is […]
I’m excited to share a little glimpse into The Cyber Hut’s primary research diary for the rest of this year. Primary Research TitleFocusEstimated ReleaseHow To Kill The PasswordTechnical overview of passwordless technologies. Market overview and vendor analysis of the top 12 passwordless solution providers. Emerging trends. Sample architectures. Use case analysis and requirements. Migration approaches. […]
Here are the most interesting items to land into The Cyber Hut inboxes this week. So Ransomware is a Terrorist Act? So it seems the US Department of Justice is raising the status of ransomware investigations to be treated with the same priority as with terrorist activity. Reuters reported on June 4th the DoJ was […]