A review of authorization related features added to ForgeRock’s Identity Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Microsoft Azure Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Google Cloud Platform between 2019-2022.

This post is only available to members.

A primer on authorization technology, covering RBAC, ABAC, XACML, OAuth2, Open Policy Agent and Zanzibar.

This post is only available to members.
A few items to appear in The Cyber Hut intelligence inboxes this week. Styra Launches Cloud Native Entitlements Solution Styra, the authorization startup behind Open Policy Agent, recently announced another solution to their kit bag. Their Cloud Native Entitlements approach seems to be aimed at bringing a distributed and replicated approach to entitlements management – […]
Some items that have hit The Cyber Hut intelligence inboxes this week. State of Passwordless Authentication 2022 HYPR HYPR, a provider of passwordless authentication, recently released their updated passwordless authentication report (sign up required). The commissioned report focuses on describing the weaknesses associated with existing authentication components. The basic username and password is under increasing […]
Join our founder Simon Moffatt on February 15th to understand why zero trust network architectures should really not rely on password based authentication. Zero trust is not a technology. It is not even a process. More a concept and culture with regards the re-engineering of network and security resources in order to support the modern, […]
On January 26th, the US Government issued a memorandum, relating to the adoption of zero trust security practices. The memo can be viewed here. What are the main points and how will it shine a light on the role of identity and access management? Page 2 of the document, immediately sets the scene with “significant […]

An independent vendor assessment of Scaled Access, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.