I recently ran another of my highly scientific polls on cyber security technology opinions last week that asked the question as to whether passwordless authentication still classified as multi factor authentication (MFA). I dropped the polls into LinkedIn and Twitter here. It generated some interesting responses. Before we dive into that, let me set the […]
Let us start with a few definitions just to get started. Authentication is focused upon asserting the properties of an entity and confirming a level of assurance. The typical process of signing in or logging in. Clearly authentication for people is quite a well known process, as we perform the task every day – sometimes […]

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe's largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

Recently I discussed how “You’re Only As Strong As Your Password Reset” – with an emphasis on how credential reset activities could well be an Achilles heel when it comes to authentication journeys. Whilst many organisations rightly start to add multi factor authentication and passwordless authentication to their arsenal of security and usability controls, it […]
When it comes to cyber security architecture, you really are only as strongest as your weakest link. Your organisation switches to blanket AES encryption with a “military grade” (what does that even mean?) 256 bit key, but then you store the key in “user land” in an unprotected part of the OS, essentially rendering it […]
This week saw the International Institute of Strategies Studies release a hefty 182 page report analysing nation state cyber security capabilities - from both an offensive and defensive point of view. The IISS also provided a launch video to introduce and discuss the report.
Some interesting stories, articles and topics that have hit The Cyber Hut mailboxes this week. Are Passwords Really Worth $1/2 billion? Identity vendor Transmit Security, this week announced a whopping series A financing around of $543 million. It is apparently the largest investment round of any cyber security company…EVER. They were founded in 2014 and […]
Threats evolve.  So should an identity and security architecture. The Cyber Hut provides a range of support options for designing, evaluating and renewing architectures that pertain to the protection of identities, devices and high value information assets. Identity Security Design Identity Security Evaluation Identity Security Optimization Design The Cyber Hut can design and assist in […]
Technology is changing – non more so than the pervasive nature of the Internet with its connected data and devices. But how does the evolving Web 3.0 landscape affect identity – both for the individual in terms of data privacy but also in terms of integration with omnipresent devices like our mobile phones? What is […]
I’m excited to share a little glimpse into The Cyber Hut’s primary research diary for the rest of this year. Primary Research TitleFocusEstimated ReleaseHow To Kill The PasswordTechnical overview of passwordless technologies. Market overview and vendor analysis of the top 12 passwordless solution providers. Emerging trends. Sample architectures. Use case analysis and requirements. Migration approaches. […]