blogs and articles Attributed as a guest blog by The Cyber Hut, articles can focus upon the industry view, voice of the customer and provide independent critique. webinars We support a range of webinar video assets – including hosted interviews, fireside chats with supporting industry analysis, trends and research releases. whitepapers / ebooks Longer read […]
Manchester, UK, June 1st 2021 The Cyber Hut (www.thecyberhut.com) identified over $2.3 billion of venture funding was raised for seed and series A rounds by global cyber security startups during 2020.  This was down from $2.6 billion in 2019. In its Analyst Report “2020 Cyber Security Startup Funding Analytics”, The Cyber Hut examined the global […]
We all know passwords are bad, but… Why aren’t we using passwordless login? Passwords are seemingly like smoking: we know they’re bad for us, we want and try to stop using them, but alas, they exist in nearly every application, service and website on the planet. Why so if the technology exists to replace passwords […]
Some interesting titbits that have appeared in The Cyber Hut inboxes this week…. You can’t protect what you don’t know about… Asset management solution provider Axonius released a report recently describing the increased need for asset discovery and management. So clearly a solution provider in that space, telling us that their solution is needed is […]
There have been some topical things drop in the mailbox of The Cyber Hut this week; namely the noise surrounding US/UK relations with Russia regarding active cyber measures. But meanwhile, the following other topics seemed of interest. World Economic Forum – Pathway to Cyber Resilient Aviation Industry The WEF published a report this week alongside […]
Today’s analyst notes features some interesting stories, articles and links that have appeared in The Cyber Hut intelligence inbox over the last week or so. What are NFT’s? Whilst not strictly a security related product, non-fungible-tokens or NFT’s are making many headlines over the last month or two. They use some interesting cryptographic primitives, to […]
An analysis of new data security provider Nullafi.

This week Google announced the general availability of their "planet scale" zero trust solution for the corporate environment, called BeyondCorp Enterprise.

BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model - away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.

By Simon Moffatt. Earlier in January, WhatsApp announced it would be making changes to its privacy policy, regarding how data would be shared with its parent company, Facebook. Whilst this change would only impact users outside of the European Union, many users have started to look to more security and privacy focused apps, such as […]
It wouldn’t be January, without the obligatory prediction articles, taking a look at what might and might not happen in the world of each technical vertical – and cyber is no different. Cyber At The Edge Even before Covid-19 reared it’s ugly head, security enforcement, management and access control was heading to the “edge”. Not […]