I recently ran another of my highly scientific polls on cyber security technology opinions last week that asked the question as to whether passwordless authentication still classified as multi factor authentication (MFA). I dropped the polls into LinkedIn and Twitter here. It generated some interesting responses. Before we dive into that, let me set the […]

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe’s largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

This post is only available to members.
When it comes to cyber security architecture, you really are only as strongest as your weakest link. Your organisation switches to blanket AES encryption with a “military grade” (what does that even mean?) 256 bit key, but then you store the key in “user land” in an unprotected part of the OS, essentially rendering it […]
Some interesting stories, articles and topics that have hit The Cyber Hut mailboxes this week. Are Passwords Really Worth $1/2 billion? Identity vendor Transmit Security, this week announced a whopping series A financing around of $543 million. It is apparently the largest investment round of any cyber security company…EVER. They were founded in 2014 and […]
Threats evolve.  So should an identity and security architecture. The Cyber Hut provides a range of support options for designing, evaluating and renewing architectures that pertain to the protection of identities, devices and high value information assets. Identity Security Design Identity Security Evaluation Identity Security Optimization Design The Cyber Hut can design and assist in […]
Technology is changing – non more so than the pervasive nature of the Internet with its connected data and devices. But how does the evolving Web 3.0 landscape affect identity – both for the individual in terms of data privacy but also in terms of integration with omnipresent devices like our mobile phones?What is Web […]
I’m excited to share a little glimpse into The Cyber Hut’s primary research diary for the rest of this year.Primary Research TitleFocusEstimated ReleaseHow To Kill The PasswordTechnical overview of passwordless technologies. Market overview and vendor analysis of the top 12 passwordless solution providers. Emerging trends. Sample architectures. Use case analysis and requirements. Migration approaches. Barriers […]
Here are the most interesting items to land into The Cyber Hut inboxes this week. So Ransomware is a Terrorist Act?So it seems the US Department of Justice is raising the status of ransomware investigations to be treated with the same priority as with terrorist activity. Reuters reported on June 4th the DoJ was taking […]
Expert independent industry opinion. Analyst Inquiry services provide an expert voice for a range of projects. Whether you are a Chief Product Officer looking for feedback on a latest go to market strategy, or a Chief Marketing Officer looking to understand emerging use cases, capabilities or requirements, our retained and PAYG inquiry services can assist […]
blogs and articles Attributed as a guest blog by The Cyber Hut, articles can focus upon the industry view, voice of the customer and provide independent critique. webinars We support a range of webinar video assets – including hosted interviews, fireside chats with supporting industry analysis, trends and research releases. whitepapers / ebooks Longer read […]