Enjoy free weekly industry analysis and comment.
Join hosts Simon Moffatt and David Mahdi on The Week in Identity podcast – where they dive into the world of identity, cyber, risk and data security – and provide independent industry analysis and insight.
Latest Self-Paced Training ->
Learn how to design, build and assess secure and usable login experiences for B2E, B2C and IoT based ecosystems. Over 7 hours of recorded content.
authentication design and management
6 Month Rolling Access
Latest Research Assets ->
Pay as You Go independent research assets to support informed procurement and design decision making.
Authentication Assessment Guide
PAYG single seat
ITDR Questions for vendors
PAYG single seat
Latest Free Insight ->
The IAM Vendor Tracking Radar
The Identity and Access Management IAM Radar provides continual vendor tracking, with curated headlines and expert analyst comment across a range of both established and emerging vendors. Events as they happen, mapped to human intelligence.
The Week in Identity Podcast
The Cyber Hut runs a weekly podcast – aptly named “The Week in Identity” – where we take an industry analyst view of the latest identity and access management events, funding and conference news. A weekly independent briefing to provide buy side insight.
IAM 2 Industry Analysis Map
The Cyber Hut tracks a range of vendors in the global identity and access management space – from established platforms, through to emerging startups focused on niche use cases. We call this IAM 2 – the Identity and Access Management Industry Analysis Map.
Trusted by Global Vendors, Integrators and Industry
The Cyber Hut has supported a range of vendor, buy side, integrator and investment clients to enhance their content, understanding and insight on the emerging identity and access management markets – through training, advisory, content and inquiry.
We Will Help Improve Your:
Industry Knowledge
Track emerging and established identity and access management vendors and understand their capabilities and strengths.
Security Posture
Leverage an Identity Threat Assessment Framework to help reduce risk, improve security and optimize existing IAM technology.
Maturity Awareness
Leverage independent opinion to compare to existing vendors or industry peers to help road map future IAM design decisions.