Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]

An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Manchester, UK. The Cyber Hut, the leading boutique industry analyst firm specialising in identity, access and cyber security technology, announced the release of a Buyer’s Guide for Passwordless Technology. The 61 page report is the result of a 12 week project analysing the vendors, use cases and capabilities associated with modern software based multi factor […]
This 8 page sample shows the table of contents and introduction. A long read research report analysing the market for passwordless authentication and how to migrate away from legacy based password authentication. This report focuses on the history and origins, consumer use cases, employee use cases, the authentication credential life cycle, capabilities analysis, vendor selection […]
The Cyber Hut are running a brief 5 question survey to understand adoption patterns for passwordless technology for 2022 and beyond. If you work in industry have responsibility or associations with authentication technology we’d love to hear your feedback. The survey is vendor agnostic, independent and anonymous. It contains 5 questions and can be completed […]
I recently ran another of my highly scientific polls on cyber security technology opinions last week that asked the question as to whether passwordless authentication still classified as multi factor authentication (MFA). I dropped the polls into LinkedIn and Twitter here. It generated some interesting responses. Before we dive into that, let me set the […]

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe’s largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

This post is only available to members.
When it comes to cyber security architecture, you really are only as strongest as your weakest link. Your organisation switches to blanket AES encryption with a “military grade” (what does that even mean?) 256 bit key, but then you store the key in “user land” in an unprotected part of the OS, essentially rendering it […]