Machine Identity 101

Machine Identity 101

| | Opinion, vendor
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, ...
GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs  

GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs  

Today Apptega announces a partnership with GBQ Partners LLC (GBQ), a top 100 tax, accounting and consulting firm headquartered in Columbus, OH. This partnership will enable GBQ to leverage Apptega’s end-to-end platform ...
PingZero: Passwordless is Here

ForgeRock and Ping Identity Capability Comparison Matrix

| | Opinion, vendor
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that ...
audits, cybersecurity audits, compliance, security, risk-based authentication, software audit API AuditBoard Adds Ability to Assess Third-Party Risks

Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution

If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...
Security Boulevard
IONIX software supply chain, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain

Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...
Security Boulevard
Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

| | Opinion, vendor
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption. The post Out of the Big Cloud 3 ...
Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry

Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry

| | News & Press Releases, vendor
Today I'm proud to announce the launch of The Cyber Hut's IAM Radar: a subscription based curated vendor intelligence report. Released monthly, the report tracks the top 6 vendors in the global ...
SGNL Just-in-Time Access Management

Vendor Introduction: sgnl.ai

| | Opinion, vendor
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ...

5 Questions to Ask Your Passwordless Authentication Vendor

| | Opinion, vendor
Passwordless authentication is often described as improving both the usability and security aspects of both the employee and customer identity journeys. Many approaches to passwordless have emerged over the last 5 years ...

Application Security Check Up