The Cyber Hut Radar - Emerging Technology Research

The Cyber Hut Radar - Emerging Technology Research

Home
Notes
Chat
Vendor Reports
Guides
Cheat Sheets
Get Free IAM Vendor Directory
Book Inquiry Consultation
Archive
About
Palo+CyberArk Completes, Omada State of IGA '26, AuthSignal Account Recovery, GitGuardian $50M Series C
Plus a round up of Identity Threat Intelligence updates
Feb 12 • The Cyber Hut

Recent posts

View all
Silverfort
Vendor Report
Feb 9 • The Cyber Hut
Cheat Sheet: Application Governance
Accelerating the expansion of IGA Infrastructure
Feb 6 • The Cyber Hut
Semperis + MightyID, Strata + CSA AI Report, Teleport Agentic Framework
Strategic & Emerging Headlines
Feb 5 • The Cyber Hut
Ory + HID, CrowdStrike + Natoma, Descope AI Hub
Strategic & Emerging Headlines
Jan 27 • The Cyber Hut
CyberArk
Vendor Report
Jan 26 • The Cyber Hut
Delinea + StrongDM, AuthSignal Palm-auth, Agentic least priv
Strategic & Emerging Headlines
Jan 20 • The Cyber Hut
Recommendations
The Cyber Hut Academy - Training Service
The Cyber Hut Academy - Training Service
The Cyber Hut
Resources
Visit The Cyber Hut
Self Paced IAM Training
Bitesize IAM Training
Engage with an Expert
The Cyber Hut Radar - Emerging Technology Research
The Cyber Hut Radar - Emerging Technology Research
Research, reports and analysis on the global Identity Security and Cyber Security industry

Vendor Report

View all
Silverfort
Vendor Report
Feb 9 • The Cyber Hut
CyberArk
Vendor Report
Jan 26 • The Cyber Hut
HYPR
https://www.hypr.com/
Dec 10, 2025
FusionAuth
https://fusionauth.io/
Dec 9, 2025
Hydden
https://hydden.com/
Dec 8, 2025

Webinar

View all
Industry Webinar: Active Directory A Primer for Protection
AD is a key attack point due to poor visibility and security controls - what can be done?
Dec 1, 2025 • The Cyber Hut
Industry Webinar: Towards Building a Continuous Identity Strategy
Why static design of concepts like joiner-mover-leaver need revisiting
Nov 14, 2025 • The Cyber Hut
Industry Webinar: Discover, Protect, Defend.
Threat detection across humans and non-humans
Sep 12, 2025 • The Cyber Hut
Industry Webinar: Identity-First Security for AI Agents
How to secure this new and fast paced identity ecosystem
Aug 6, 2025 • The Cyber Hut
Industry Webinar: Addressing the IAM Data Problem
What is IAM Data?
Jul 16, 2025 • The Cyber Hut

Cheatsheet

View all
Cheat Sheet: Application Governance
Accelerating the expansion of IGA Infrastructure
Feb 6 • The Cyber Hut
Cheat Sheet: Top 30 IAM Metrics for B2C
Understanding the Coverage, Performance and Effectiveness of B2C IAM
Sep 19, 2025 • The Cyber Hut
Cheat Sheet: Top 30 IAM Metrics for B2E
Understanding the Coverage, Performance and Effectiveness of Identity
Aug 27, 2025 • The Cyber Hut
Cheat Sheet: MCP Security
Open source resources, articles and provider links
Jul 9, 2025 • The Cyber Hut
Cheat Sheet: Agentic AI Identity Security
Open source resources, articles and provider links
Jun 13, 2025 • The Cyber Hut

Conference

View all
Review of Black Hat Europe 2025
Leading security vulnerability research event hits London
Dec 12, 2025 • The Cyber Hut
Review of The Identity Underground Summit 2025
A specialist practitioner-only community
Oct 8, 2025 • The Cyber Hut
Review of Whitehall IDM Europe 2025
This week I attended one of the Whitehall Conference events on their Amsterdam stop.
Oct 1, 2025 • The Cyber Hut
Review of IAM Tech Day 2025 Porto
I had the pleasure of being asked to keynote the first IAM Tech Day for Europe this week in the beautiful city of Porto.
Sep 25, 2025 • The Cyber Hut
IAM at RSAC 2025
A conference retrospective by Simon Moffatt
May 6, 2025 • The Cyber Hut

Guide

View all
Non-Human Identity: Success Metrics
How to measure successful NHI project deployment
Dec 15, 2025 • The Cyber Hut
Non-Human Identity: Questions to Ask Vendors
A request for information and request for proposal getting started guide
Dec 9, 2025 • The Cyber Hut
Key Non-Human Identity Platform Capabilities
A high level research note
Dec 5, 2025 • The Cyber Hut
Metrics and Measurements: ISPM
Example metrics and measurements list for identity security posture management
Sep 10, 2025
Use Case List: ISPM
Example use case list for identity security posture management
Sep 8, 2025 • The Cyber Hut
© 2026 The Cyber Hut · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture