No Category
Expert independent industry opinion.What you need, when you need it. CISO Briefing Inquiry services provide an expert voice for a range of projects. Whether you are a looking to engage a vendor and design an RFP, perform a maturity assessment for an existing identity and access management investment or enable a team on market technologies, the CISO […]
Trust within the identity world is a huge priority. Trust regarding the on-boarding and registration of external users via proofing (think assurance levels using identity validation and verification techniques) right through to creating trust labels for employees in order to monitor for malicious activity - that is either driven by external threat actors, insider threat or just unintentional bad user behaviour.
When on briefings and inquiry workshops there are often emerging themes that start to spring up repeatedly. Perhaps every few months, perhaps under different projects, using different terms and stories and perhaps from unexpected people or teams.
There has been one theme over the past 12 months or so that is difficult to ignore: not only how identity based security has left-shifted into the thinking of information leaders to being a first-class citizen in the technology arsenal, but how identity is moving into a new territory. The territory of autonomy.
Vendor introduction report covering oort.io - an emerging vendor in the Identity Threat Detection and Response sector.
A few interesting items to hit The Cyber Hut intelligence inboxes over the past couple of weeks. Funding Roundup: Antimatter and SkiffSkiff a privacy enablement startup focused on the end-to-end encrypted workspace just received a $10.5 million Series A, lead by Sequoia. What do they do? They are focused on creating a completely private decentralised […]