software audit API AuditBoard Adds Ability to Assess Third-Party Risks

Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution

If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in ...
Security Boulevard
SUSE open source software supply chain SaaS lesson threat intelligence SBOM

Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain

Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a ...
Security Boulevard
Securing Your Infrastructure with MSP Vendor Risk Management

Securing Your Infrastructure with MSP Vendor Risk Management

The recent 3CX breach awoke many managed service providers (MSPs) to the harsh reality that they’re only as secure as their most vulnerable vendor. In what seems to have been a targeted attack ...
Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

Out of the Big Cloud 3 – Are Microsoft Becoming The Dominant Identity Services Provider?

| | Opinion, vendor
A review of the recent re-brand of Microsoft Entra for their IAM capabilities and the results of two community polls relating to Microsoft adoption. The post Out of the Big Cloud 3 ...
Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry

Introducing the IAM Radar: Curated Headlines and Comment on the Global IAM Industry

| | News & Press Releases, vendor
Today I'm proud to announce the launch of The Cyber Hut's IAM Radar: a subscription based curated vendor intelligence report. Released monthly, the report tracks the top 6 vendors in the global ...
SGNL Just-in-Time Access Management

Vendor Introduction: sgnl.ai

| | Opinion, vendor
An introduction to just in time, next generation authorization vendor sgnl.ai The post Vendor Introduction: sgnl.ai appeared first on The Cyber Hut ...

5 Questions to Ask Your Passwordless Authentication Vendor

| | Opinion, vendor
Passwordless authentication is often described as improving both the usability and security aspects of both the employee and customer identity journeys. Many approaches to passwordless have emerged over the last 5 years ...
An Introduction to IDQL: A Language for Identity Orchestration

An Introduction to IDQL: A Language for Identity Orchestration

| | Opinion, vendor
Let us start with the basics. IDQL stands for Identity Query Language. The description given to it from the Hexa website (I'll come back to Hexa in a minute) is "Identity Query ...

What is Styra Run?

| | Opinion, vendor
Styra, the team behind "Cloud Native Authorization" recently announced a few feature called "Styra Run". Their launch blog back in July described Run as being "a new holistic approach" to authorization. But ...