Hardware, Software & People: Why All Identities Need a Life Cycle

Hardware, Software & People: Why All Identities Need a Life Cycle

| | Opinion
A discussion on the need to consider identity management as a set of life cycles - for expansion into the workload and NHI spaces. The post Hardware, Software & People: Why All ...
Identity Data Automation: The What and Why

Identity Data Automation: The What and Why

| | Opinion
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The ...
Is IGA in Distress? If So Why?

Is IGA in Distress? If So Why?

| | Opinion, Polls
A discussion on modern identity governance and administration requirements and why many projects are in distress. The post Is IGA in Distress? If So Why? appeared first on The Cyber Hut ...
Are PAM and IGA Converging?

Are PAM and IGA Converging?

| | Opinion, Polls
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution ...
Workload Identity or Non-Human Identity?

Workload Identity or Non-Human Identity?

| | Opinion, Polls
We ran another anecdotal community poll recently, asking whether this area of service IAM should be termed as "workload identity" or the more emerging "non-human identity". The post Workload Identity or Non-Human ...
Poll Result: Is Passwordless the Big Ticket Item for 2024?

Poll Result: Is Passwordless the Big Ticket Item for 2024?

| | Opinion, Polls
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view ...

What’s The Difference Between Machine and Workload Identity?

| | Opinion
So in this respect how does a workload differ from a machine? Well machines will typically be host centric and operating system related. That could be anything from bare metal servers (remember ...
Blackhat EMEA 2023 Review

Blackhat EMEA 2023 Review

| | events, Opinion
This four-day security extravaganza tours the world, and I attended the keynotes and briefings sessions on the 6th and 7th. Clearly this is a broader security conference, but as always the role ...
Machine Identity 101

Machine Identity 101

| | Opinion, vendor
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, ...
PingZero: Passwordless is Here

ForgeRock and Ping Identity Capability Comparison Matrix

| | Opinion, vendor
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that ...

Application Security Check Up