Educate -> Enable -> Empower Online, Self-paced, Masterclass and Custom Training The Cyber Hut provides a range of industry support resources to help break down the complexities of the broader identity and access management industry. Online & Self Paced The Cyber Hut partners with the Teachable Learning Platform, to provide a range of immersive online […]
We all know passwords are bad, but…Why aren’t we using passwordless login? Passwords are seemingly like smoking: we know they’re bad for us, we want and try to stop using them, but alas, they exist in nearly every application, service and website on the planet. Why so if the technology exists to replace passwords with […]
There have been some topical things drop in the mailbox of The Cyber Hut this week; namely the noise surrounding US/UK relations with Russia regarding active cyber measures. But meanwhile, the following other topics seemed of interest.World Economic Forum – Pathway to Cyber Resilient Aviation IndustryThe WEF published a report this week alongside integrator Deloitte, […]
A long read research report analysing the market for passwordless authentication and how to migrate away from legacy based password authentication. This report focuses on the history and origins, consumer use cases, employee use cases, the authentication credential life cycle, capabilities analysis, vendor selection guidance and funding details for software based modals focused on FIDO […]
An analysis of new data security provider Nullafi.
Identity Management is Evolving The Cyber Hut is singularly focused on the global identity and access management market. Whether you are procuring a passwordless MFA solution, analysing the market for identity proofing for future investment or seeking the latest authorization startup design patterns, The Cyber Hut will have an opinion.  Some of the technology areas we […]
By Simon MoffattIn the above figure we describe the basic life cycle for consumer identity and access management as containing 9 distinct stages:OnboardingProofingSecure LoginDevice BindingContextual & Adaptive AccessProfile ManagementConsent ManagementData ManagementAccount RemovalA basic linear flow typically occurs, where Onboarding would clearly occur before Profile Management. But some aspects can be more modular or integrated independently.For […]

This week Google announced the general availability of their “planet scale” zero trust solution for the corporate environment, called BeyondCorp Enterprise.

BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model – away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.

This post is only available to members.
By Simon Moffatt.The last 6 months has seen some interesting innovation occur within the privacy and data security spaces. It seems some specific decoupling of end to end encryption, privacy vaulting and data centric security is starting to occur.Why is this interesting? Typically organisations have tackled the privacy situation using two pretty large tools: data […]
The UK government opened an industry call for consultation in November 2020, regarding the protection of some 17 key industry sectors with regards to foreign investment. Those seventeen areas cover sectors such as robotics, AI, cryptography, civil nuclear, energy, transport and biology amongst others.Foreign Direct Investment (FDI) cranked upwards of $750 billion in the last […]