Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Identities face relentless threats, with attackers often outpacing defenders in speed. Their rapid tactics give them a breakout time of 84 minutes (according to CrowdStrike’s 2024 Global Threat Report1), making the fallout ...

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity threat actors ...
5 Tips to Make Sense of the Gartner IAM MQ and Cool Vendor

5 Tips to Make Sense of the Gartner IAM MQ and Cool Vendor

| | Market
In a sea of great vendors (and maybe one or two bad ones!), how do you choose the solution that will help you achieve secure, visible, and efficient IAM? As a leading ...
Niche Players

7 Tips to Make Sense of the Gartner IAM Magic Quadrant

| | Market, security
The world of Identity and Access Management (IAM) is not just about selecting a vendor – it’s about selecting the right vendor. In a rapidly evolving sector, making informed decisions is critical ...

Analyst Notes – Styra Cloud Entitlements, Beyond Identity $100m, NSA Cisco Password Recommendations, Aserto Authorization Service Launch

| | Market, Opinion
A few items to appear in The Cyber Hut intelligence inboxes this week. Styra Launches Cloud Native Entitlements Solution Styra, the authorization startup behind Open Policy Agent, recently announced another solution to ...

Analyst Notes – IC Consult & ICSynergy, Open Policy Agent and Consumer Identity Market Explosion

| | Market, Opinion
A few items that have popped into The Cyber Hut inboxes over the past week relating to funding and vendor news. iC Consult Group Completes Acquisition of ICSynergy iC Consult, a European ...
What Next for Authorization?

What Next for Authorization?

| | Market, Opinion
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going ...