A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces.
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view.
No Category
A 34 page guide for learning how to develop an assessment framework for people-centric authentication and login systems. Table of contents: Introduction Importance of Authentication Improved Security and Access Control Improved Trust and Accountability Compliance with Regulations Supporting Personalization and User Experience Foundation for Authorization Minimizing Insider Threats Importance of Authentication Testing Increased Adversarial Targeting […]
This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role of identity and access management appears in more ways than previous and often in slightly less obvious ways.
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, yet automation, the use of machines and services (powered by clever software) will certainly be doing more for us as humans than ever before - as employees, customers and citizens.
Our founder Simon Moffatt will be speaking at FIDO Authenticate 2023 in Carlsbad San Diego October 16-18th.
This three-day auth-fest will see the world's authentication, authorization and identity experts converge for some deep dive discussions and networking on a broad array of topics - from passkeys and biometrics, through to proofing and access control.
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
A discussion on how role based access control may still deliver business value, if deployed in a slightly different way.
I wanted to expand to this based on conversations I've had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR - what it is and why it's important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
Our founder Simon Moffatt will be delivering a keynote presentation at the Heliview Identity and Access Management conference on May 23rd. The event hosted at the Omnisport Apeldoorn arena in the Netherlands boasts a great lineup of industry specialists and suppliers from the likes of Okta, Saviynt, Beyond Trust, Okta, Trust Builder, ID Veritas, Sailpoint, […]