vendor
Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution
If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...
Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain
Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...
Securing Your Infrastructure with MSP Vendor Risk Management
The recent 3CX breach awoke many managed service providers (MSPs) to the harsh reality that they’re only as secure as their most vulnerable vendor. In what seems to have been a targeted attack ...
What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...
Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption. The post Out of the Big Cloud 3 ...
Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry
Today I'm proud to announce the launch of The Cyber Hut's IAM Radar: a subscription based curated vendor intelligence report. Released monthly, the report tracks the top 6 vendors in the global ...
Vendor Introduction: sgnl.ai
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ...
5 Questions to Ask Your Passwordless Authentication Vendor
Passwordless authentication is often described as improving both the usability and security aspects of both the employee and customer identity journeys. Many approaches to passwordless have emerged over the last 5 years ...
An Introduction to IDQL: A Language for Identity Orchestration
Let us start with the basics. IDQL stands for Identity Query Language. The description given to it from the Hexa website (I'll come back to Hexa in a minute) is "Identity Query ...
What is Styra Run?
Styra, the team behind "Cloud Native Authorization" recently announced a few feature called "Styra Run". Their launch blog back in July described Run as being "a new holistic approach" to authorization. But ...