It wouldn’t be January, without the obligatory prediction articles, taking a look at what might and might not happen in the world of each technical vertical – and cyber is no different. Cyber At The Edge Even before Covid-19 reared it’s ugly head, security enforcement, management and access control was heading to the “edge”. Not […]
Who we are Our website address is: https://www.thecyberhut.com. The Cyber Hut is a trading name of TCH Research Ltd, registered in England and Wales. Company number 13188456. What personal data we collect and why we collect it Comments When visitors leave comments on the site we collect the data shown in the comments form, and […]
Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app.  Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step verification.  There are lots more […]
Unless you have been living in a darkened room for a long time, you will know the countdown for the EU’s General Data Protection Regulation is dramatically coming to a head.  May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order […]
This is the first in a series of blogs, that will start to look at some use cases for leveraging block chain technology in the world of identity and access management.  I don’t proclaim to be a BC expert and there are several blogs better equipped to tackle that subject, but a good introductory text […]
We can get insurance for virtually anything these days.  Cars obviously (albeit if that wasn’t law, how many would pay for it?).  Ourselves.  Pets.  Eyes.  Teeth.  Holidays.  You name it and The Meerkat can sort it out.  The market for insurance is highly complex, with econometrics playing a large part in determining the potential risk […]
The ‘insider’ is the dude in the office.  He (or she) probably works in IT and looks and acts like a regular employee.  They are however, probably a bigger risk to the organisations corporate information than a hacker on the public internet. An insider is generally seen as a trusted user of the network.  They […]