vendor
Machine Identity 101
Machines are eating the world. Or is it software? No wait, it's AI. In someways, it will likely be none, neither or all. I don't think any will make us all extinct, ...
GBQ Joins Apptega’s Growing Network of Firms Dedicated to Building World-Class Compliance Programs
Today Apptega announces a partnership with GBQ Partners LLC (GBQ), a top 100 tax, accounting and consulting firm headquartered in Columbus, OH. This partnership will enable GBQ to leverage Apptega’s end-to-end platform ...
ForgeRock and Ping Identity Capability Comparison Matrix
In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that ...
Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution
If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...
Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain
Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...
What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...
Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption. The post Out of the Big Cloud 3 ...
Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry
Today I'm proud to announce the launch of The Cyber Hut's IAM Radar: a subscription based curated vendor intelligence report. Released monthly, the report tracks the top 6 vendors in the global ...
Vendor Introduction: sgnl.ai
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ...
5 Questions to Ask Your Passwordless Authentication Vendor
Passwordless authentication is often described as improving both the usability and security aspects of both the employee and customer identity journeys. Many approaches to passwordless have emerged over the last 5 years ...