We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity".
So in this respect how does a workload differ from a machine? Well machines will typically be host centric and operating system related. That could be anything from bare metal servers (remember those?) right through to more specific devices working in the IoT, industrial IoT, aviation, transport or medical spaces....
No Category
Community Building Video Content The Cyber Hut provides a unique foundation for industry and category defining webinars and video material that leading Cyber Security and Identity and Access Management vendors use for community enablement. Interviews Founders and vendor executives can be interviewd by specialist analysts to undercover the mission and vision behind emerging technology. get […]
Next week our founder Simon Moffatt will be hosting two panels at the Future Identity Festival in London. The two day event hosted an array of stages focused on financial services and fraud, identity and access management and fintech solutions – with a broad array of sponsors and suppliers too. Simon will be hosting two […]
Our next industry webinar will be taking place on September 17th at 4pm UK time, where our founder Simon Moffatt will be in conversation with Ian Ahl, CTO at Permiso.
They'll be taking a deep dive into the world of holistic identity security, that covers both human and non-human identities.
Join us for our next industry webinar where we'll be diving into the world of Agent AI security.
Join us for our next industry webinar on July 22nd taking a look at IAM Data Management.
Identity Security is a topic we have tracked and discussed on numerous occasions at The Cyber Hut over the past 12 months. As the role of identity and access management has changed fundamentally over the past 5 years – expanding into customers, citizens, non-humans and machines – IAM has become a prize-winning target for adversarial […]
Identity Security – a complex, nuanced and yet equally dynamic, exciting and business enabling concept that has emerged in the last 3 years – yet still generates a great deal of inquiry discussion around what it is, what it isn’t, which vendors deliver it, what do they actually deliver and so on. To that end, […]
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces.