<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Hut Radar - Emerging Technology Research]]></title><description><![CDATA[Research, reports and analysis on the global Identity Security and Cyber Security industry]]></description><link>https://radar.thecyberhut.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Lq6a!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png</url><title>The Cyber Hut Radar - Emerging Technology Research</title><link>https://radar.thecyberhut.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 23 May 2026 17:06:27 GMT</lastBuildDate><atom:link href="https://radar.thecyberhut.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Cyber Hut]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecyberhut@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecyberhut@substack.com]]></itunes:email><itunes:name><![CDATA[The Cyber Hut]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Cyber Hut]]></itunes:author><googleplay:owner><![CDATA[thecyberhut@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecyberhut@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Cyber Hut]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Runtime Attribution, Identity + Browser Matrix, The Rise of Intent Management]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/runtime-attribution-identity-browser</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/runtime-attribution-identity-browser</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 19 May 2026 11:32:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/5JjW456A0eY" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Why We Built Identity Runtime Attribution for AI Agents</h2><p>Permiso Security have <a href="https://permiso.io/blog/why-we-built-identity-runtime-attribution-for-ai-agents?utm_source=thecyberhut.com">brought up the point</a> that agents need more than just posture management to make them secure. They articulate that guardrails and permissions cleanup are only part of the solution - which is entirely correct, and I would argue the three main pillars to agentic security are <strong>access</strong> <strong>control</strong>, <strong>guardrails</strong> and <strong>intent</strong> <strong>management</strong>. More to follow on that in the coming weeks.  They state that:</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;When an agent gets compromised, the investigation crosses boundaries. The agent used a human credential to authenticate. The sub-agent it spawned created a service account that accessed a SaaS application through an API. If your agent security tool only sees agents, you are reconstructing half the story. Our Universal Identity Graph already tracks human and non-human identities across IdPs, cloud infrastructure, SaaS applications, and CI/CD pipelines, and agents are now a new node on that same graph with the same investigative tools, alert workflows, and response controls.&#8221;</strong></em></p></div><p>This is all good stuff, and amplifies the need to not only link agents to humans but also take a look at not only what they access to, but what they&#8217;re doing.</p><div><hr></div><h2>Browser &amp; Identity Attacks Matrix</h2><p>We all love attack matrices and threat models. Don&#8217;t we? I personally do and it&#8217;s a great way of not only helping workshop out potential attacks and in turn threat response apparatus, but they&#8217;re also really good at bringing together different stakeholders (aka, red team -v- blue team, application users -v- application designers) to use a common nomenclature and set of terms. We have Mitre Att&amp;ck which is great. </p><p>Using that as inspiration, Push Security have <a href="http://Browser &amp; Identity Attacks Matrix">released a matrix with a specific focus on browser and identity-centric attacks.</a> This has a similar feel to Mitre, but has a different taxonomy and TTP structure.  Why did they do it?</p><div class="callout-block" data-callout="true"><p><em><strong>&#8220;When we released the<a href="https://pushsecurity.com/blog/saas-attack-techniques/"> SaaS attack matrix</a> in 2023, we were anticipating a shift that was just beginning to take shape. The techniques that attackers were using to compromise cloud applications and identities weren&#8217;t well represented in existing frameworks, and many of the ones we documented hadn&#8217;t yet been widely observed in the wild.</strong></em></p><p><em><strong>A year later, we<a href="https://pushsecurity.com/blog/the-saas-attack-matrix-one-year-on/"> reviewed what had changed</a> and found that the initial access phase &#8212; the techniques designed to compromise an identity in the first place &#8212; was where almost all of the attacker innovation was concentrated. And two years on, that trend has become the story of the modern threat landscape.</strong></em></p><p><em><strong>Today, we&#8217;re re-releasing the matrix as the<a href="https://pushsecurity.com/resources/browser-identity-attacks-matrix/"> Browser &amp; Identity Attacks Matrix</a>. The name change isn&#8217;t cosmetic. It reflects that the attacks driving the most consequential breaches are browser-based and identity-first.&#8221;</strong></em></p></div><p>It&#8217;s available on Github and I can see value for both defenders and offensive security professionals alike.</p><div><hr></div><h2 style="text-align: center;">Select Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Industry Announcements</h3><ul><li><p><strong>Axiomatics</strong>: <a href="https://axiomatics.com/blog/securing-ai-systems-how-policy-driven-authorization-solves-the-owasp-llm-top-10?utm_source=radar.thecyberhut.com">Securing AI systems: How policy-driven authorization solves the OWASP LLM Top 10</a></p></li><li><p><strong>AWS</strong>: <a href="https://aws.amazon.com/blogs/security/the-aws-ai-security-framework-securing-ai-with-the-right-controls-at-the-right-layers-at-the-right-phases/?utm_source=radar.thecyberhut.com">The AWS AI Security Framework: Securing AI with the right controls, at the right layers, at the right phases</a></p></li><li><p><strong>Cerbos</strong>: <a href="https://www.cerbos.dev/blog/what-is-a-runtime-authorization-platform?utm_source=radar.thecyberhut.com">What is a Runtime Authorization Platform?</a></p></li><li><p><strong>LoginRadius</strong>: <a href="https://www.loginradius.com/blog/engineering/building-security-analytics">Building Real Time Security Analytics: The Point Where We Realized Logs Are Not Enough</a></p></li><li><p><strong>Veza</strong>: <a href="https://veza.com/blog/veza-expands-ai-agent-security-to-servicenow-ai-agents/?utm_source=radar.thecyberhut.com">Expands AI Agent Security to ServiceNow AI Agents</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p><a href="https://docs.cloud.google.com/docs/security/threat-model/bigquery-threat-model?utm_source=radar.thecyberhut.com">BigQuery Threat Model Report</a></p></li><li><p><a href="https://dreadnode.io/research/redefining-ai-red-teaming-in-the-agentic-era/?utm_source=radar.thecyberhut.com">Redefining AI Red Teaming in the Agentic Era</a></p></li><li><p><a href="https://www.proofpoint.com/us/blog/threat-insight/device-code-phishing-evolution-identity-takeover?utm_source=radar.thecyberhut.com">Device Code Phishing is an Evolution in Identity Takeover</a></p><p style="text-align: center;"></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest On Demand Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Open Source Research Cheat Sheets</h2><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;261300ff-2526-4433-b8df-22996e6cfbf3&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic Identity Owner Discovery&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-14T09:57:28.119Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:194074390,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;db381ed1-41c1-4e3c-99f3-a2bf4de36fa8&quot;,&quot;caption&quot;:&quot;Agent Identity and Access Management&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic-AI Security Architecture Example&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-17T12:46:12.060Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188254238,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;86bc8bea-58eb-4120-ae22-144b774b32c7&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Application Governance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-06T10:09:46.814Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-application-governance&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:187004317,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b548b2be-f1e6-4eb2-be59-ed553e69c379&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;12c28adf-76bb-4897-827d-cdff15c32179&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for SSH</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for SSH services</p><div id="youtube2-Ulm_4atZiIk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ulm_4atZiIk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ulm_4atZiIk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h2 style="text-align: center;">Latest Podcast Episode</h2><p style="text-align: center;">E73 The Analyst Brief: AI Impact on Access Decisioning and Runtime Security</p><div id="youtube2-5JjW456A0eY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;5JjW456A0eY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/5JjW456A0eY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest Research Report</strong></h2><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: center;">Latest Insight by The Cyber Hut</h2><p style="text-align: center;"><a href="https://www.radiantlogic.com/resource/identities-under-attack-how-adversaries-exploit/">Identities Under Attack: How Adversaries Exploit the Human&#8211;Machine&#8211;Agent Divide (Panel)</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/unified-design-consolidating-access-across-physical-and-digital-realms?utm_source=thecyberhut.com">Unified by Design: Consolidating Access Across Physical and Digital Realms</a></p><p style="text-align: center;"><a href="https://www.radiantlogic.com/blog/best-practices-for-ai-powered-ivip/?utm_source=radar.thecyberhut.com">Best Practices for AI Powered IVIP</a></p><p style="text-align: center;">From Anonymous to Accountable: Giving AI Agents a Digital Identity</p><p style="text-align: center;"><a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">The Unified Identity Imperative: Breaking the Cycle of Fragmentation</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance</a></p><p style="text-align: center;"></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h2 style="text-align: center;"><strong> Recent Industry Webinars by The Cyber Hut</strong></h2><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Training Academy Episodes by The Cyber Hut</strong></h2><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:196884892,&quot;url&quot;:&quot;https://academy.thecyberhut.com/p/40-how-to-measure-identity-security&quot;,&quot;publication_id&quot;:1795411,&quot;publication_name&quot;:&quot;The Cyber Hut Academy - Training Service&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!LgyR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png&quot;,&quot;title&quot;:&quot;40: How to Measure Identity Security?&quot;,&quot;truncated_body_text&quot;:null,&quot;date&quot;:&quot;2026-05-08T10:59:22.899Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;handle&quot;:&quot;thecyberhut&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;profile_set_up_at&quot;:&quot;2022-10-21T09:39:20.518Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-11-12T21:34:06.194Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1104346,&quot;user_id&quot;:34112948,&quot;publication_id&quot;:1152167,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1152167,&quot;name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;subdomain&quot;:&quot;thecyberhut&quot;,&quot;custom_domain&quot;:&quot;radar.thecyberhut.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Research, reports and analysis on the global Identity Security and Cyber Security industry&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;author_id&quot;:34112948,&quot;primary_user_id&quot;:34112948,&quot;theme_var_background_pop&quot;:&quot;#FF0000&quot;,&quot;created_at&quot;:&quot;2022-10-21T09:41:35.891Z&quot;,&quot;email_from_name&quot;:&quot;The Cyber Hut Radar&quot;,&quot;copyright&quot;:&quot;The Cyber Hut&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92e276a4-0fa6-491e-8b41-0778f35ea407_556x230.png&quot;}},{&quot;id&quot;:1778865,&quot;user_id&quot;:34112948,&quot;publication_id&quot;:1795411,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:1795411,&quot;name&quot;:&quot;The Cyber Hut Academy - Training Service&quot;,&quot;subdomain&quot;:&quot;iambitesize&quot;,&quot;custom_domain&quot;:&quot;academy.thecyberhut.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Regular bitesize training and cheat sheets for the key topics, acronyms and themes in the global identity security - in 10 mins or less.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png&quot;,&quot;author_id&quot;:34112948,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#EA82FF&quot;,&quot;created_at&quot;:&quot;2023-07-11T15:14:18.664Z&quot;,&quot;email_from_name&quot;:&quot;The Cyber Hut Academy&quot;,&quot;copyright&quot;:&quot;The Cyber Hut&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da748bb7-4564-41e6-b0ac-4f01c9b5c203_556x230.png&quot;}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://academy.thecyberhut.com/p/40-how-to-measure-identity-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!LgyR!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png" loading="lazy"><span class="embedded-post-publication-name">The Cyber Hut Academy - Training Service</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">40: How to Measure Identity Security?</div></div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">13 days ago &#183; The Cyber Hut</div></a></div><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest Getting Started Guide</strong></h2><p style="text-align: center;">Getting Started with Access Consolidation: A Practical Guide to Unified Identity</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tPE4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tPE4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 424w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 848w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 1272w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tPE4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png" width="598" height="537" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52eca215-040e-438a-a836-3a554061a386_598x537.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:537,&quot;width&quot;:598,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:43469,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/198388471?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tPE4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 424w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 848w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 1272w, https://substackcdn.com/image/fetch/$s_!tPE4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52eca215-040e-438a-a836-3a554061a386_598x537.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/getting-started-access-consolidation-practical-guide-unified-identity?utm_source=thecyberhut.com&quot;,&quot;text&quot;:&quot;Read Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/getting-started-access-consolidation-practical-guide-unified-identity?utm_source=thecyberhut.com"><span>Read Now</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest Vendor Introduction Interviews</strong></h2><div id="youtube2-yPgWTfsRQXs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yPgWTfsRQXs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yPgWTfsRQXs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-3_RNdwGdsfM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3_RNdwGdsfM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3_RNdwGdsfM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[C1 Headless Identity, Palo Alto Human Identity, Sailpoint Agentic Fabric, Strata Agentic Sprawl]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/c1-headless-identity-palo-alto-human</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/c1-headless-identity-palo-alto-human</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 12 May 2026 10:38:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/0C_gZ3HNklE" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div><hr></div><h2 style="text-align: center;">Select Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Industry Announcements</h3><ul><li><p><a href="https://aws.amazon.com/blogs/opensource/introducing-trusted-remote-execution-policy-enforced-scripts-for-ai-agents-and-humans/?utm_source=radar.thecyberhut.com">AWS: Introducing Trusted Remote Execution: Policy-Enforced Scripts for AI Agents and Humans</a></p></li><li><p><a href="https://auth0.com/blog/auth0-fga-permissions-index-developer-preview/?utm_source=radar.thecyberhut.com">Auth0: FGA Permissions Index Is Now in Developer Preview</a></p></li><li><p><a href="https://www.beyondtrust.com/blog/entry/geopolitics-and-cybersecurity-total-pasm?utm_source=radar.thecyberhut.com">Beyond Trust: Geopolitics and Cybersecurity: Why Attackers Go After Identities and Privileged Access First</a></p></li><li><p><a href="https://www.c1.ai/blog/announcing-c1-headless-identity-infrastructure?utm_source=radar.thecyberhut.com">C1: The Headless Identity Infrastructure</a></p></li><li><p>Ory: <a href="https://changelog.ory.com/announcements/ory-network-ory-hydra-ory-kratos-ory-oathkeeper-v26-2-10-released">Platform Updates</a></p></li><li><p><a href="https://www.paloaltonetworks.com/blog/cloud-security/unified-human-identities-identity-risk-context/?utm_source=radar.thecyberhut.com">Palo Alto: Introducing Unified Human Identities: See the Person Behind Every Account</a></p></li><li><p><a href="https://www.sailpoint.com/press-releases/sailpoint-launches-agentic-fabric?utm_source=radar.thecyberhut.com">SailPoint Launches Agentic Fabric to Secure AI Identities Across the Enterprise</a></p></li><li><p><a href="https://www.strata.io/blog/agentic-identity/a-guide-to-agentic-sprawl-how-to-govern-your-program/?utm_source=radar.thecyberhut.com">Strata: A Guide to Agentic Sprawl: How to Govern Your Program</a></p></li><li><p><a href="https://goteleport.com/blog/dora-evidence-agentic-ai/?utm_source=radar.thecyberhut.com">Teleport: Guide: DORA Compliance Evidence for Agentic AI</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p><a href="https://github.com/ReversecLabs/azure-iam-enum?utm_source=radar.thecyberhut.com">Tool: azure-iam-enum - Azure RBAC enumerator</a></p></li><li><p><a href="https://medium.com/@BerendWatchusIndependent/first-publication-llm-agents-leave-fingerprints-a-case-for-behavioral-attribution-in-the-age-of-1c64b57326e1">LLM Agents Leave Fingerprints: A Case for Behavioral Attribution in the Age of Autonomous Attackers</a></p></li><li><p><a href="https://www.recordedfuture.com/blog/types-of-payment-fraud?utm_source=radar.thecyberhut.com">Types and Prevention of Payment Fraud</a></p></li><li><p><a href="https://www.kaspersky.co.uk/blog/passwords-hacking-research-2026/30552/?utm_source=radar.thecyberhut.com">Cracked in under a minute: (nearly) every other password</a></p></li><li><p><a href="https://medium.com/@firiki.intel/personal-recon-vulnerability-assessment-a203223a73f3">Personal Recon: Vulnerability Assessment</a></p></li></ul><p style="text-align: center;"></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest On Demand Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Open Source Research Cheat Sheets</h2><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;261300ff-2526-4433-b8df-22996e6cfbf3&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic Identity Owner Discovery&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-14T09:57:28.119Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:194074390,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;db381ed1-41c1-4e3c-99f3-a2bf4de36fa8&quot;,&quot;caption&quot;:&quot;Agent Identity and Access Management&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic-AI Security Architecture Example&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-17T12:46:12.060Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188254238,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;86bc8bea-58eb-4120-ae22-144b774b32c7&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Application Governance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-06T10:09:46.814Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-application-governance&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:187004317,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b548b2be-f1e6-4eb2-be59-ed553e69c379&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;12c28adf-76bb-4897-827d-cdff15c32179&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for SSH</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for SSH services</p><div id="youtube2-Ulm_4atZiIk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ulm_4atZiIk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ulm_4atZiIk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E72 The Analyst Brief: Mythos and the Vulnerability Revolution</p><div id="youtube2-0C_gZ3HNklE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;0C_gZ3HNklE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/0C_gZ3HNklE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight by The Cyber Hut</h3><p style="text-align: center;"><a href="https://blog.hidglobal.com/unified-design-consolidating-access-across-physical-and-digital-realms?utm_source=thecyberhut.com">Unified by Design: Consolidating Access Across Physical and Digital Realms</a></p><p style="text-align: center;"><a href="https://www.radiantlogic.com/blog/best-practices-for-ai-powered-ivip/?utm_source=radar.thecyberhut.com">Best Practices for AI Powered IVIP</a></p><p style="text-align: center;">From Anonymous to Accountable: Giving AI Agents a Digital Identity</p><p style="text-align: center;"><a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">The Unified Identity Imperative: Breaking the Cycle of Fragmentation</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes by The Cyber Hut</strong></h3><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:196884892,&quot;url&quot;:&quot;https://academy.thecyberhut.com/p/40-how-to-measure-identity-security&quot;,&quot;publication_id&quot;:1795411,&quot;publication_name&quot;:&quot;The Cyber Hut Academy - Training Service&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!LgyR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png&quot;,&quot;title&quot;:&quot;40: How to Measure Identity Security?&quot;,&quot;truncated_body_text&quot;:null,&quot;date&quot;:&quot;2026-05-08T10:59:22.899Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;handle&quot;:&quot;thecyberhut&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;profile_set_up_at&quot;:&quot;2022-10-21T09:39:20.518Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-11-12T21:34:06.194Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1104346,&quot;user_id&quot;:34112948,&quot;publication_id&quot;:1152167,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1152167,&quot;name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;subdomain&quot;:&quot;thecyberhut&quot;,&quot;custom_domain&quot;:&quot;radar.thecyberhut.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Research, reports and analysis on the global Identity Security and Cyber Security industry&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;author_id&quot;:34112948,&quot;primary_user_id&quot;:34112948,&quot;theme_var_background_pop&quot;:&quot;#FF0000&quot;,&quot;created_at&quot;:&quot;2022-10-21T09:41:35.891Z&quot;,&quot;email_from_name&quot;:&quot;The Cyber Hut Radar&quot;,&quot;copyright&quot;:&quot;The Cyber Hut&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92e276a4-0fa6-491e-8b41-0778f35ea407_556x230.png&quot;}},{&quot;id&quot;:1778865,&quot;user_id&quot;:34112948,&quot;publication_id&quot;:1795411,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:1795411,&quot;name&quot;:&quot;The Cyber Hut Academy - Training Service&quot;,&quot;subdomain&quot;:&quot;iambitesize&quot;,&quot;custom_domain&quot;:&quot;academy.thecyberhut.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Regular bitesize training and cheat sheets for the key topics, acronyms and themes in the global identity security - in 10 mins or less.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png&quot;,&quot;author_id&quot;:34112948,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#EA82FF&quot;,&quot;created_at&quot;:&quot;2023-07-11T15:14:18.664Z&quot;,&quot;email_from_name&quot;:&quot;The Cyber Hut Academy&quot;,&quot;copyright&quot;:&quot;The Cyber Hut&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da748bb7-4564-41e6-b0ac-4f01c9b5c203_556x230.png&quot;}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;,&quot;source&quot;:null}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://academy.thecyberhut.com/p/40-how-to-measure-identity-security?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!LgyR!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png" loading="lazy"><span class="embedded-post-publication-name">The Cyber Hut Academy - Training Service</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">40: How to Measure Identity Security?</div></div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">12 days ago &#183; The Cyber Hut</div></a></div><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><div id="youtube2-3_RNdwGdsfM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3_RNdwGdsfM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3_RNdwGdsfM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>What is Teleport&#8217;s Agentic Security Framework?</strong></h3><div id="youtube2-AHIUFtGOWvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AHIUFtGOWvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AHIUFtGOWvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Acquisitions: Cisco + Astrix Security, Silverfort + Fabrix Security]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/acquisitions-cisco-astrix-security</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/acquisitions-cisco-astrix-security</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 05 May 2026 11:10:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/1qCSmEAjQ9E" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 style="text-align: center;">Cisco to Acquire Astrix Security</h2><p>Cisco this week announced they are to acquire NHI startup <a href="https://astrix.security/">Astrix Security</a>. Traditional security models focus on human users, but modern systems rely heavily on <strong>AI agents and non-human identities</strong>, which often operate with excessive privileges and limited oversight. </p><p>What will Astrix bring to Cisco? Astrix provides capabilities to discover and map AI agents and their activities, govern access and lifecycle of non-human identities, detect and respond to threats in real time and manage secrets (credentials, tokens) centrally.</p><p>This will impact Cisco&#8217;s strategic vision in a few ways. They aim to extend their <strong>Zero Trust security model</strong> to the &#8220;agentic workforce&#8221;&#8212;ensuring AI agents are continuously verified, monitored, and controlled, not implicitly trusted. </p><p>The Astrix stack will be integrated into Cisco&#8217;s security ecosystem, including:</p><ul><li><p>Identity Intelligence (for visibility and context) (previous Oort acquisition)</p></li><li><p>Secure Access and Duo (for access control and authentication)</p></li></ul><blockquote><p><em><strong>&#8220;Joining Cisco means Astrix now has the scale, the reach, and the platform to bring agentic and NHI security to organizations worldwide. Astrix&#8217;s capabilities will be integrated across the Cisco Security platform &#8212; including Cisco Identity Intelligence, Secure Access, Duo, and Splunk &#8212; to deliver end-to-end discovery, governance, and threat detection for every agentic and non-human identity and AI agent. Cisco&#8217;s unmatched visibility across identity, network, application, and infrastructure layers &#8212; combined with Astrix&#8217;s deep NHI and agentic security capabilities &#8212; creates an opportunity to protect enterprises at a level that simply wasn&#8217;t possible before.&#8221;</strong></em> - Alon Jackson CEO Astrix Security</p></blockquote><div id="youtube2-1qCSmEAjQ9E" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1qCSmEAjQ9E&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1qCSmEAjQ9E?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h2 style="text-align: center;">Silverfort to Acquire Fabrix</h2><p>Silverfort recently <a href="https://www.silverfort.com/press-news/silverfort-acquires-fabrix-security/">announced</a> it has acquired Fabrix Security, a startup focused on AI-driven identity security. Financial terms were not disclosed. The acquisition aims to create an <strong>autonomous identity security platform</strong> that can make and enforce access decisions in real time&#8212;something traditional, rule-based systems struggle to do at scale. </p><p>Silverfort has long been developing a range of identity security capabilities and acquired <a href="https://www.silverfort.com/blog/silverfort-acquires-rezonate-cloud-identity-security/">Rezonate</a> in 2024 to expand ITDR functionality to cloud systems.</p><p>So what will <a href="https://fabrix.security/">Fabrix</a> add? Fabrix adds an <strong>AI-driven decisioning engine and identity knowledge graph </strong>Together, they enable dynamic, context-aware decisions about whether an identity (human, machine, or AI agent) should access a resource at any moment. The rise of <strong>non-human identities and AI agents</strong> is overwhelming static access control models. This combined platform is designed to handle access decisions continuously and autonomously, at the speed required in modern environments.</p><blockquote><p><em><strong>&#8220;We founded Fabrix with a clear vision: making Identity Security easier, faster, and more scalable using an AI-native approach,&#8221; said Raz Rotenberg, CEO and Co-Founder of Fabrix. &#8220;By joining Silverfort, we can bring this transformation to the largest companies in the world and combine our AI engine with Silverfort&#8217;s runtime enforcement to create something no one has achieved before. We are excited to become part of the team shaping the future of Identity Security.&#8221;</strong></em></p></blockquote><div><hr></div><h2 style="text-align: center;">Select Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Industry Announcements</h3><p style="text-align: center;"><a href="https://www.calcalistech.com/ctechnews/article/rk900cethzg">Capsule Security raises $7 million Seed to secure enterprise AI agents</a></p><p style="text-align: center;"><a href="https://www.technobezz.com/news/openai-launches-passkey-security-for-chatgpt-with-yubico-partnership">OpenAI Launches Passkey Security for ChatGPT with Yubico Partnership</a></p><p><a href="https://aws.amazon.com/blogs/security/can-i-do-that-with-policy-understanding-the-aws-service-authorization-reference/?utm_source=radar.thecyberhut.com">Can I do that with policy? Understanding the AWS Service Authorization Reference</a></p><p style="text-align: center;"><a href="https://cloudsecurityalliance.org/blog/2026/05/01/identity-in-the-age-of-ai-rethinking-zero-trust-s-first-pillar?utm_source=radar.thecyberhut.com">Identity in the Age of AI: Rethinking Zero Trust&#8217;s First Pillar</a></p><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><p style="text-align: center;"><a href="https://blog.doyensec.com/2026/05/05/cloudsectidbits-masso-cognito-sso.html">The Danger of Multi-SSO AWS Cognito User Pools</a></p><p style="text-align: center;"><a href="https://socradar.io/blog/hackers-ai-cyber-attacks/">Top 10 Ways Hackers Use AI for Cyber Attacks</a></p><p style="text-align: center;"><a href="https://www.slashid.dev/blog/vercel-april-2026-security-incident/?utm_source=radar.thecyberhut.com">Vercel April 2026 Security Incident: How a Compromised OAuth App Led to a Major Breach</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest On Demand Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Open Source Research Cheat Sheets</h2><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;261300ff-2526-4433-b8df-22996e6cfbf3&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic Identity Owner Discovery&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-14T09:57:28.119Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:194074390,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;db381ed1-41c1-4e3c-99f3-a2bf4de36fa8&quot;,&quot;caption&quot;:&quot;Agent Identity and Access Management&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic-AI Security Architecture Example&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-17T12:46:12.060Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188254238,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;86bc8bea-58eb-4120-ae22-144b774b32c7&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Application Governance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-06T10:09:46.814Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-application-governance&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:187004317,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b548b2be-f1e6-4eb2-be59-ed553e69c379&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;12c28adf-76bb-4897-827d-cdff15c32179&quot;,&quot;caption&quot;:&quot;Why? Identity and Access Management has never been more important. From improving employee productivity, to enabling zero trust and remote access, IAM has moved from being just a cost centre aligned to infrastructure and operations to having integrations against a broad set of orthogonal technology areas such as end point security, data security, network&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Top 30 IAM Metrics for B2E&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-27T09:06:47.567Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49b10789-4805-4e68-877f-75d0c2ecc841_1141x464.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:168628166,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:8,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for SSH</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for SSH services</p><div id="youtube2-Ulm_4atZiIk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ulm_4atZiIk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ulm_4atZiIk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E71 The Analyst Brief: A Review of RSAC 2026</p><div id="youtube2--2LggnLxU-k" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-2LggnLxU-k&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-2LggnLxU-k?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight by The Cyber Hut</h3><p style="text-align: center;"><a href="https://blog.hidglobal.com/unified-design-consolidating-access-across-physical-and-digital-realms?utm_source=thecyberhut.com">Unified by Design: Consolidating Access Across Physical and Digital Realms</a></p><p style="text-align: center;"><a href="https://www.radiantlogic.com/blog/best-practices-for-ai-powered-ivip/?utm_source=radar.thecyberhut.com">Best Practices for AI Powered IVIP</a></p><p style="text-align: center;">From Anonymous to Accountable: Giving AI Agents a Digital Identity</p><p style="text-align: center;"><a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">The Unified Identity Imperative: Breaking the Cycle of Fragmentation</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><div id="youtube2-3_RNdwGdsfM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3_RNdwGdsfM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3_RNdwGdsfM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>What is Teleport&#8217;s Agentic Security Framework?</strong></h3><div id="youtube2-AHIUFtGOWvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AHIUFtGOWvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AHIUFtGOWvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Review of IAM Tech Day Sao Paulo 2026]]></title><description><![CDATA[The largest IAM event in LATAM]]></description><link>https://radar.thecyberhut.com/p/review-of-iam-tech-day-sao-paulo</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/review-of-iam-tech-day-sao-paulo</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 28 Apr 2026 11:44:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mrHk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week I had the pleasure of attending and presenting at this years <a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/?utm_source=thecyberhut.com">IAM Tech Day</a> down in Sao Paulo, Brazil. <a href="https://www.linkedin.com/in/alfredosantos/">Alfredo Santos</a> and team have created a great community of identity experts from a broad range of sectors and locations across Latin America.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mrHk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mrHk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mrHk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2542455,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!mrHk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mrHk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd9b526f-badd-41bf-8745-e4648c664090_3264x3264.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The 2-day event attracted over 2500 attendees and a strong vendor sponsor list - from large established players to more niche startups, along with numerous systems integrators and consultancies.</p><div><hr></div><h3>Where Is IAM Heading?</h3><p>I opened day 1 with a presentation entitled &#8220;A Dynamic World Needs Dynamic IAM: Where Are We Heading?&#8221; - and provided a look into the main research areas we have seen at <a href="https://www.thecyberhut.com/">The Cyber Hut</a> over the past 12 months.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BhiK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BhiK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BhiK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg" width="1080" height="1440" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1440,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:225018,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BhiK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BhiK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58673a97-03df-4553-9799-941bc4aac0b8_1080x1440.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As identity and access management has moved from being a tactical and responsive part of the internal workforce infrastructure, to a strategic enabler that improves productivity, drives revenue and online experiences for B2C ecosystems and integrates with a broad array of cyber security technologies, it has become a major attack vector for adversarial activity. Many would argue it has become <em>the</em> attack vector.</p><p>Complex and fragmented infrastructure combined with a highly evolving black market for attack tooling (potentially coupled with AI-based vulnerability exploitation platforms) has lead to a huge spike in identity related risk. That risk is focused at both the identity data layer and post-auth runtime layer too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RVvy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RVvy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RVvy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101083,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RVvy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!RVvy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3be1d0db-42e1-4e31-9977-3685045e1309_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To that end we have seen a new set of technology areas emerge since 2022 that look to improve the security and risk posture of the entire IAM infrastructure world.</p><p>At the identity data layer (and with respect to identity data I mainly refer to profiles, policies and permissions) we see a slew of acronyms from IVIP (identity visibility and intelligence platforms), ISPM (identity security posture management) and further expansion of IGA (identity governance and administration) that leads into application governance and AI-governance.</p><div><hr></div><h3 style="text-align: center;">A Future Guide to Identity Security</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oev9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oev9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oev9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oev9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oev9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oev9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg" width="1456" height="1043" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1043,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2382107,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oev9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oev9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oev9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oev9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6d138bf-dbaa-470b-91e7-f82e18b55bf6_3875x2775.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;">Available globally on Amazon, in Kindle, paperback and hardback</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://a.co/d/05cZyHDB&quot;,&quot;text&quot;:&quot;Order Now on Amazon&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://a.co/d/05cZyHDB"><span>Order Now on Amazon</span></a></p><div><hr></div><p>The strategic focus here is to essentially augment our access request and access review processing with more context - leveraging data sources that already exist within the modern enterprise - and make our decision making smarter. AI is accelerating this decision making too and we&#8217;re seeing a range of use cases that improve integration, permissions analysis and policy removal as a result.</p><p>From a runtime point of view, we&#8217;re seeing numerous initiatives here - including ITDR (identity threat detection and response) and many subtle sub-classes of behaviour analysis. The focus is understanding the <em><strong>intent </strong></em>of an identity - not just making sure they have the correct permissions. This will involve analysing usage and comparing behaviour across-applications. This often requires composite-risk analysis engines - taking into consideration several signals to help triangulate risk and trigger a responsive action. </p><p>Understanding <em><strong>when </strong></em>to act is often as difficult as deciding what to do as a response. The response aspect is also evolving and will require more than just a simple allow/deny choice. Disrupting, degrading, redirecting and more subtle response measures are now common - and especially in the external B2C space and aim to deliver security AND usability simultaneously.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gi57!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gi57!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!gi57!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!gi57!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!gi57!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gi57!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f21906a-6bba-4927-a67e-16152295db5f_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:111319,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gi57!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!gi57!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!gi57!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!gi57!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f21906a-6bba-4927-a67e-16152295db5f_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A more strategic view of course is not just how to handle the <strong>data</strong> and <strong>runtime</strong> aspects of identity risk but do so across ALL identity types. We&#8217;re seeing innovation within IGA, ISPM and PAM with the increased usage of generative and agentic AI to improve decision making - alongside expansions into the non-human governance space too.</p><p>Ultimately both identity data and behaviour monitoring needs to support non-human, workloads, and agentic-AI as well as both B2E and B2C identity types. </p><div><hr></div><h3>Further Resources on Identity Data Risk</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;cfa9cf15-4f1e-4942-9742-5618abbec1c9&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic Identity Owner Discovery&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-14T09:57:28.119Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:194074390,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e894b339-a9d1-4b21-8384-d396fbedcc84&quot;,&quot;caption&quot;:&quot;Agent Identity and Access Management&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic-AI Security Architecture Example&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-17T12:46:12.060Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188254238,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;bab45bb2-dc8d-4aae-9c24-28b079c7c20e&quot;,&quot;caption&quot;:&quot;The What&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Application Governance&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-06T10:09:46.814Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-application-governance&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:187004317,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>IAM for AI and AI for IAM</h3><p>Every cyber or IAM conference in 2026 is going to have a heavy focus on AI - either to accelerate IAM adoption or in attempt to secure parts of the AI ecosystem.</p><p>Okta started day 1 with a generic focus on how both the LLM and agentic are firstly  different components, but also have different control requirements.  They articulated that a focus on the &#8220;information flows&#8221; between assets is a more strategic approach alongside a central plane that looks at both the identity creation flows and the runtime interception and enforcement of permissions.</p><p>Sailpoint extended the AI focus, with a need to provide IGA and life cycle management features for non-human identities as well as humans. A key first-principle to that model is to assign <strong>owners</strong> to agents, workloads and NHIs. This needs to be done for both existing live identities (that are essentially orphaned) as well as imposing sponsors during identity creation time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TvB5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TvB5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TvB5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3408693,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!TvB5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TvB5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa430ec6-acc1-4983-a9e1-fc62cde2a903_3264x3264.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Later in the morning, an Okta hosted a panel with ySec and TecPar that looked at AI from a more security exploitation standpoint. The rise of deepfakes, the increased speed of attacks and the ability to craft attacks in a &#8220;no-code&#8221; way has essentially given the attackers the advantage - for the time being.  To that end, AI can be used to help discover the landscape first - what identities exist, where they are stored and what they are permitted to do. It really becomes essential to move from a reactive security standpoint to one that is more pro-active.</p><p>eTrust articled that AI is really in its &#8220;toddler&#8221; years - and emphasised again that using a sponsor and ownership is key to governance (take a look here at our recent <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner">Agentic Ownership</a> guide).</p><p>Thales - the long time authentication specialists - amplified the story that AI is accelerating login based attacks. From improvements to how attackers can craft phishing emails. Later in the day they also presented a case study where they show how an authentication assessment (internal and external identities versus high and low risk) can help to identify future authentication modality requirements. </p><p>Platform providers CoffeeBean discussed how the combination of identity orchestration alongside AI is the strategic way to manage workforce IAM. As B2E has evolved, organisations need to integrate IAM into more systems, consume different data points and be more modular and fine grained with how IAM capabilities are deployed. The integration of logs and activity data can provide a continuous feedback loop into policies and controls. The key is augment existing pillars of IAM capability to improve coverage and usability.</p><p>Day 2 saw a panel hosted by NetBR that included practitioners from Ita&#250; Unibanco and Bradesco that discussed how AI can help with IAM but also the controls needed to secure it. From an IAM point of view, access request, IDV analysis and account take over (ATO) protection were prime uses of emerging AI capabilities. The panel also observed how AI adoption is amplifying the need for data protection and how the concepts of external authorization platforms and policy based access control (PBAC) are key parts of that journey.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Aqqq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Aqqq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Aqqq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4420472,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Aqqq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Aqqq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fbd2f47-d333-4dd3-a9b7-78f79d40b42d_3264x3264.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Hut Radar - Emerging Technology Research is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h3>Identity for Security and Security for Identity</h3><p>There are very few cyber security technology sectors (think XDR, data, mobile, cloud, network) that don&#8217;t either relying hugely on IAM working effectively (which is rarely does) or expect bi-directional integrations for data and runtime tokens and decision making. To that end, there were numerous talks amplifying the security angle of identity - either to protect the IAM infrastructure and its components, as well as the identities, accounts and usage of those components.</p><p>Sec4U on day 1 introduced the concept of the &#8220;identity attack surface&#8221; and how it is increasing. As organisational maturity gravitates to an all-digital approach for staff, customers, services and products, the level of risk increases. As a result, IAM strategy needs to move away from standard joiner-mover-leaver concepts and focus on being continual, continuous and contextual.</p><p>A practitioner panel from the airline manufacturer Embraer discussed how security considerations such as intellectual property protection are driving their IAM design. Insider threat, external attacks and complex supply chains can increase risk through visibility blind-spots and a lack of full coverage IGA capabilities. An increased focus on IAM process automation not only reduces error and human effort, it can also allow the organisation to become more risk adverse, by having confidence in the underlying processes. That then allows Embraer to move faster, collaborate and be more competitive. Some tactical comments also emerged, from the need to migrate to just in time (JiT) access to making sure IAM can fully integrate into the security operations centre (SoC) for analysis and investigations.</p><p>ManageEngine gave a talk looking at the huge rise in shadow identity - the impact of that and what can be done to tackle it. Whilst traditionally AD-centric, they articulated a broader strategy to improve both IT-security controls adoption and cleanup of the core identity data landscape.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q7UC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q7UC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q7UC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3306145,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q7UC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q7UC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F67072821-2d5e-46ce-bfc6-99ec5b95e756_3264x3264.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The end of day 1 saw Prove discuss not just security of IAM, but more the privacy of identity data components. The attributes that make up a profile (especially in the B2C space) can be abused as part of identity verification, fraud and PII theft. They articulated the multi-source issue of how identity attributes can be leaked - and in turn used to create synthetic or blended identities that are then used for future attacks and data theft. These false identities can also be used in disinformation campaigns and influence operations that are proliferating into concerns such as election interference. Their solution is provide an identity-graph model that can continuously check identity attribute location and usage, verifying usage, integrity and historical assurance.</p><div><hr></div><h3 style="text-align: center;">B2C CIAM Design Fundamentals</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CgVU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CgVU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 424w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 848w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 1272w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CgVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png" width="573" height="610" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7db81543-915a-4f64-89a6-062579c0500a_573x610.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:610,&quot;width&quot;:573,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68923,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CgVU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 424w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 848w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 1272w, https://substackcdn.com/image/fetch/$s_!CgVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7db81543-915a-4f64-89a6-062579c0500a_573x610.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;">Available globally on Amazon, in paperback and Kindle.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://a.co/d/0bATIiLy&quot;,&quot;text&quot;:&quot;Buy now on Amazon&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://a.co/d/0bATIiLy"><span>Buy now on Amazon</span></a></p><div><hr></div><p>Day 2 saw Banco Bradesco (the third largest bank by assets in Brazil) discuss a case study. Some interesting aspects included the need to future proof against emerging security threats - such as post-quantum readiness and protection against the rise of deepfakes. Identity and security in general is a process not a product and they have developed modular approach to both designing, implementing and deploying IAM components for staff, customers and non-human identities, with composable features for authentication and authorization.</p><div><hr></div><h3>Further Insight and Whitepapers</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2014d16a-0b28-4a88-bbbc-3a3894404fa6&quot;,&quot;caption&quot;:&quot;Organizations today manage access in two very different domains: physical spaces (buildings, offices, secure areas) and digital environments (applications, systems, data). Historically, these have evolved separately, using different technologies, teams, and policies.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Designing for Converged Access&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-21T10:49:43.940Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!cmZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/designing-for-converged-access&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:194782050,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a76cbbe7-a81e-4bfe-8d65-081c11ab6e7e&quot;,&quot;caption&quot;:&quot;Analyst Comment&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Claude Mythos and Project Glasswing: The End of Cyber Security As We Know It?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-04-10T10:40:19.523Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!U6if!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/claude-mythos-and-project-glasswing&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:193777338,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:5,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d1c3d471-abdd-486e-a3ef-8c2904662176&quot;,&quot;caption&quot;:&quot;As organisations scale across cloud, SaaS, and AI-driven environments, identity has become the primary control plane for security and access. Yet most enterprises still operate with a fragmented identity architecture&#8212;multiple tools, disconnected policies, and incomplete visibility.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Hidden Risk of Fragmented Identity&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-26T14:18:16.856Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!K-kJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:191585404,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><p>Raise IT (a partner of Transmit Security) discussed the security and fraud components that are emerging within the B2C CIAM space. Fraud is no longer just attacking the account creation and on-boarding phases, but must be handled end to end at all parts of the B2C life cycle. With the advent of agentic-AI within the B2C world, a transaction signing lineage must be considered that can provide assurance and integrity protection for transactions.</p><p>JumpCloud gave a novel description of how device analysis and mobile device management (MDM) systems have evolved into more generic endpoint protection platforms - and must be more closely linked into the privilege access management flows. They argued that identity on its own cannot live in a vacuum and the originating device must be considered during authentication and authorization enforcement checks. Hexnode delivered a similar message later in the day, with their solution offering a broad array of mobile and device integration options in order to strengthen the coverage for device security.</p><p>Later on day 2, Silverfort argued that original joiner-mover-leaver processes were not built for security - they were built for productivity and compliance. As organisations move towards a more hybrid deployment model, visibility and control of identity usage becomes a vulnerability. Their view of identity security involves a &#8220;runtime access protection RAP&#8221; component that can augment and extend Active Directory authentication and access with a range of behaviour and threat detection capabilities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xSs2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xSs2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xSs2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4553935,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xSs2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xSs2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ba15291-86f8-4eda-8eec-fe72265bdf00_3264x3264.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Recent Industry Interviews</h3><div id="youtube2-AHIUFtGOWvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AHIUFtGOWvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AHIUFtGOWvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-3BSI0gRu1GQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3BSI0gRu1GQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3BSI0gRu1GQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-3_RNdwGdsfM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3_RNdwGdsfM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3_RNdwGdsfM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>Final Comment</h3><p>IAM Tech Day is one of the premier identity events globally, not just for LATAM. The core themes of AI and identity security amplified what is happening in North America, EMEA and APAC too.</p><p>As IAM becomes a strategic enabler for technology transformation, business productivity and revenue generation, the security and privacy aspects become critical.</p><p>How we measure and deploy IAM services is changing massively. Several talks (including those by Shield Security, Sec4U and NetBR) all showcased modern and strategic approaches of how to embed IAM within the C-level talk track. From improved communications and metrics to how to find and in turn manage risk. IAM strategies and tactics need to be co-authored with a broad array of stakeholders. The use of natural language processing as the standard user experience (UX) of choice can open up previously complex IAM policy components to non-technical leaders who can both consume performance data, but also contribute to the overall management of the IAM world.</p><p>It becomes critical to work in a top-down model - identifying business and team objectives <em><strong>before </strong></em>identifying the data, cyber and identity components that help or hinder those plans. What does MFA really do for the business? How can just in time access help their partners or customers? These lower level controls must be translated and presented in a way that matters to the key budget holders.</p><p>If organisations can achieve that, their future identity strategy will both enable security but also improve usability.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4PXT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4PXT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4PXT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg" width="1456" height="1711" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1711,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1695796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4PXT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 424w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 848w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!4PXT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d4d8177-e116-4d70-b642-d34418af85a9_3320x2825.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Sa&#250;de!</p><div><hr></div><h3>Vendor and Integrator Shout Outs</h3><p><a href="https://authcube.com/?utm_source=radar.thecyberhut.com">Authcube</a> - Orchestrate and protect identities in one unique platform what unite security and <em>experience</em></p><p><a href="https://coffeebeantech.com/?utm_source=radar.thecyberhut.com">CoffeeBean Technology</a> - <em>Orchestration in IAM refers to the automated coordination of identity and access management processes across systems, applications, and security tools.</em></p><p><a href="https://www.e-trustsecurity.com/?utm_source=radar.thecyberhut.com">eTrust Security</a> - <em>We are cyber security. We are identity.</em></p><p><a href="https://jumpcloud.com/?utm_source=radar.thecyberhut.com">JumpCloud</a> - <em>Securely manage devices and access for all human, non-human, and agentic identities.</em></p><p><a href="https://www.netbr.com.br/?utm_source=radar.thecyberhut.com">NetBR</a> - <em>We are an extension of your company, generating knowledge through interaction with your teams , delivering greater value to your identity program.</em></p><p><a href="https://www.prove.com/?utm_source=radar.thecyberhut.com">Prove</a> - <em>Prove transforms identity from a one-time verification event into a persistent foundation of trust-built to verify every person, business, and AI agent, at every interaction.</em></p><p><a href="https://www.sec4u.com.br/en?utm_source=radar.thecyberhut.com">Sec4U</a> - <em>Your security doesn't have to be complex! Protect your workforce and digital customers without impacting your business flows and usability. </em></p><p><a href="https://shieldsec.com.br/?utm_source=radar.thecyberhut.com">Shield Security</a> - <em>Shield Security has a broad portfolio of services associated with the best manufacturers on the market. The goal is to offer excellent service, seeking to understand the needs of each client for a personalized delivery.</em></p><p><a href="https://www.silverfort.com/?utm_source=radar.thecyberhut.com">Silverfort</a> - <em>Discover and protect every dimension of identity, everywhere. Human, machine or AI, cloud or on-prem&#8212;including systems that couldn&#8217;t be protected befor</em></p><div><hr></div><h3><strong>About The Author</strong></h3><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8211; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uKCq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uKCq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uKCq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3606491,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/195632015?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!uKCq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uKCq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e374f0-094c-4e1c-80eb-0a678c58b91d_3264x3264.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/market-overview-discussion?back=1&amp;month=2026-04&quot;,&quot;text&quot;:&quot;Book 90 Minute Discussion Workshop&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/market-overview-discussion?back=1&amp;month=2026-04"><span>Book 90 Minute Discussion Workshop</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Designing for Converged Access]]></title><description><![CDATA[The importance of unifying identity data across physical and digital landscapes]]></description><link>https://radar.thecyberhut.com/p/designing-for-converged-access</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/designing-for-converged-access</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 21 Apr 2026 10:49:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cmZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Organizations today manage access in two very different domains: <strong>physical spaces</strong> (buildings, offices, secure areas) and <strong>digital environments</strong> (applications, systems, data). Historically, these have evolved separately, using different technologies, teams, and policies.</p><p>That separation is increasingly becoming a problem.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Hut Radar - Emerging Technology Research is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>The Challenge of Fragmented Access</strong></h3><p>When physical and digital access are handled in silos, organizations struggle with:</p><ul><li><p><strong>Inconsistent policies</strong> across systems</p></li><li><p><strong>Gaps in security</strong>, especially during onboarding and offboarding</p></li><li><p><strong>Limited visibility</strong> into who has access to what</p></li><li><p><strong>Operational inefficiencies</strong> from duplicated processes</p></li></ul><p>For example, an employee may lose system access immediately after leaving&#8212;but still retain access to a building. These disconnects introduce risk and complexity.</p><h3><strong>A Shift Toward Unified Access</strong></h3><p>To address this, organizations are moving toward a <strong>unified design model</strong>, where <strong>identity becomes the central control point</strong> for all types of access.</p><p>In this approach:</p><ul><li><p>A single identity governs access to <strong>both physical and digital resources</strong></p></li><li><p>Policies are applied consistently across environments</p></li><li><p>Access decisions are centralized and context-aware</p></li></ul><p>This represents a shift from <strong>system-centric security</strong> to <strong>identity-centric security</strong>.</p><p>As organizations continue to digitize and expand, managing access in silos is no longer sustainable. A <strong>unified, identity-centric approach</strong> provides stronger security, better efficiency, and a more seamless user experience&#8212;bringing together the physical and digital worlds under a single access strategy.</p><div><hr></div><p>I wrote about this concept in more detail in a recent analyst opinion piece written for <a href="https://www.hidglobal.com/">HID</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cmZH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cmZH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 424w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 848w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 1272w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cmZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png" width="812" height="598" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:598,&quot;width&quot;:812,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:397563,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/194782050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cmZH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 424w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 848w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 1272w, https://substackcdn.com/image/fetch/$s_!cmZH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bebe1cc-fa56-4bbc-a65a-ba16afda0899_812x598.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/unified-design-consolidating-access-across-physical-and-digital-realms?utm_source=thecyberhut.com&quot;,&quot;text&quot;:&quot;Read Full Article&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/unified-design-consolidating-access-across-physical-and-digital-realms?utm_source=thecyberhut.com"><span>Read Full Article</span></a></p><div><hr></div><h3>About The Author</h3><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8212; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/p/designing-for-converged-access?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Hut Radar - Emerging Technology Research! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/p/designing-for-converged-access?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://radar.thecyberhut.com/p/designing-for-converged-access?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cheat Sheet: Agentic Identity Owner Discovery]]></title><description><![CDATA[A key capability for developing life cycle management governance]]></description><link>https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/cheat-sheet-agentic-identity-owner</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 14 Apr 2026 09:57:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The What</h2><p>In early 2025 The Cyber Hut released a discussion-focused article on the &#8220;<a href="https://www.thecyberhut.com/10-laws-of-identity-security/">Laws of Identity Security</a>&#8221;. The idea behind this was to create interest around what identity security is and how we can start to pragmatically approach the security controls and architectural design stages.</p><p>Law 3 in that series was: <em><strong>&#8220;Every digital identity (human and non-human) must resolve to a carbon physical person who is accountable for it&#8221;.</strong></em></p><p>As AI agents proliferate &#8212; often outnumbering human identities by 50:1 or more &#8212; the ability to trace every agent back to a responsible human owner is foundational to governance, incident response, compliance, and risk management. Without it, organisations face &#8216;ghost agents&#8217; with active privileges and no accountability.</p><p>Agents need accountability yes, but they also need to be strategically managed as part of a life cycle. That life cycle in turn needs to be linked to a human life cycle for completeness.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Hut Radar - Emerging Technology Research is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>The Why</h2><p>The human B2E employee life cycle can be quite well defined. A basic Google search (or other) will likely generate something like the following:</p><ul><li><p><strong>Joiner (Onboarding)</strong></p><ul><li><p>Creation of the digital identity from an authoritative source (HR system)</p></li><li><p>Account creation + initial access provisioning</p></li><li><p>Often automated for Day 1 readiness</p></li></ul></li><li><p><strong>Identity Proofing &amp; Verification</strong></p><ul><li><p>Ensuring the person is who they claim to be</p></li><li><p>Background checks, document validation, etc. (more critical in high-assurance roles)</p></li></ul></li><li><p><strong>Authentication Setup</strong></p><ul><li><p>Credential issuance (passwords, MFA, passkeys)</p></li><li><p>Binding user to authentication methods/devices</p></li></ul></li><li><p><strong>Authorization / Access Provisioning</strong></p><ul><li><p>Assigning roles, groups, entitlements</p></li><li><p>Based on RBAC/ABAC policies (least privilege principle)</p></li></ul></li><li><p><strong>Access Request &amp; Approval</strong></p><ul><li><p>Ongoing process where users request additional access</p></li><li><p>Workflow-driven approvals (manager, app owner, etc.)</p></li></ul></li><li><p><strong>Access Review &amp; Certification</strong></p><ul><li><p>Periodic audits of user access (compliance-driven)</p></li><li><p>Managers/app owners validate &#8220;who still needs what&#8221;</p></li></ul></li><li><p><strong>Mover (Role Change / Lifecycle Update)</strong></p><ul><li><p>Adjusting access when a user changes role, department, or project</p></li><li><p>Prevents privilege creep</p></li></ul></li><li><p><strong>Leaver (Offboarding / Deprovisioning)</strong></p><ul><li><p>Timely removal of access when a user leaves</p></li><li><p>Includes account disablement, session termination, and cleanup</p></li></ul></li></ul><p>Now clearly, each of those stages will also have sub-life cycles too. Especially for things like credential management and and issuance. Of course, many organisations struggle to automate these components and are faced with issues such as:</p><ul><li><p>Orphan accounts - no longer linked to a real identity</p></li><li><p>Ghost accounts - never linked to a real identity</p></li><li><p>Excess Permissions - assigned versus used out of sync</p></li></ul><p>So what? Well we now need to consider an equivalent <strong>agentic</strong> life cycle - even if that world is relatively new in comparison.</p><p>An example life cycle model for agents could look something like the following:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jT7J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jT7J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 424w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 848w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 1272w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jT7J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png" width="935" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88a07aac-8608-49b4-9843-e639484f55ea_935x814.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:935,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:161325,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/194074390?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jT7J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 424w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 848w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 1272w, https://substackcdn.com/image/fetch/$s_!jT7J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88a07aac-8608-49b4-9843-e639484f55ea_935x814.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The management of the agentic life cycle is going to require some different approaches and likely tooling to that of the human world. That is out of scope for this cheat sheet however.</p><p>What becomes clear though, is that we need to link the agentic life cycle with the human one. Agents do not and cannot live in a vacuum.</p><div><hr></div><h2>Capabilities</h2><p>We are now presented with several issues:</p><ol><li><p>How to find an owner for agents already live that are orphaned</p></li><li><p>How to assign ownership during agent creation in a way that doesn&#8217;t inhibit development</p></li><li><p>How to enforce life cycle changes for humans and agents together</p></li></ol><p>A few ways seem to exist with respect to how this could be done.</p><ul><li><p><strong>AI/ML correlation</strong> &#8212; analyses logs, code commits, device telemetry, or behavioural signals to infer the likely human owner.</p></li><li><p><strong>Blended/delegated identity</strong> &#8212; binds the human&#8217;s IdP token to the agent at session initiation (e.g. OAuth On-Behalf-Of flow).</p></li><li><p><strong>Manual/admin assignment</strong> &#8212; a human administrator explicitly designates an owner in the platform UI or via policy.</p></li><li><p><strong>Sponsor/succession model</strong> &#8212; a formal sponsor is required at creation; ownership auto-transfers if the sponsor leaves.</p></li><li><p><strong>Creation-time attribution</strong> &#8212; the identity of the creator/deployer is captured when the agent is registered or provisioned.</p></li><li><p><strong>HR/directory integration</strong> &#8212; ownership is inferred from organisational data (Active Directory, Okta, HR systems).</p></li><li><p><strong>Access review/certification campaigns</strong> &#8212; periodic campaigns prompt stakeholders to confirm or reassign ownership.</p></li></ul><p>Not all methods are comparative of course and rely on different information sources and dependencies within the infrastructure.</p><p>There is also a subtle difference between <strong>live</strong> agents and <strong>future</strong>-<strong>created</strong> processes needed to assign an owner at creation time. The current state many organisations are likely to be in, is the former - facing discovery and inventory exercises for agents that are already live.</p><div><hr></div><p style="text-align: center;"><strong>Let us know your approaches to this emerging problem:</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/survey/6814645?token=&quot;,&quot;text&quot;:&quot;Start Survey on Agentic Ownership&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://radar.thecyberhut.com/survey/6814645?token="><span>Start Survey on Agentic Ownership</span></a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cpBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cpBS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 424w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 848w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 1272w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cpBS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png" width="748" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:748,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61765,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/194074390?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cpBS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 424w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 848w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 1272w, https://substackcdn.com/image/fetch/$s_!cpBS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe53b2cc7-0335-47d9-aa6a-e4fe6d188ad4_748x455.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Market Considerations</h2><ol><li><p>Many vendors consider ownership as a <strong>secondary</strong> function - even if they provide the capability. Immediate focus is often on discovery, then authentication, authorization and permission management</p></li><li><p>Two dominant paradigms exist: <strong>proactive</strong> discovery vs. <strong>creation</strong>-<strong>time</strong> capture - the use of &#8220;live&#8221; data such as logs, telemetry are used as inference of ownership. Creation capture provides support for the longer-term governance model.</p></li><li><p><strong>Sponsor</strong> model seems most compliant-ready - having a dedicated human sponsor used during agent creation (and in turn provides downstream changes if the human sponsor undergoes changes themselves) seems the most likely to support compliance interrogation. </p></li><li><p><strong>Linking</strong> of human identity provider tokens to downstream agents can provide an end to end level of cryptographic traceability.</p></li><li><p>Post creation access review campaigns need <strong>context</strong> - reviewing existing agent permissions and &#8220;liveness&#8221; requirements really needs an owner to be identified first for them to be effective</p></li></ol><div><hr></div><h2>Example Vendor Solutions for Agentic Ownership</h2><p>There are numerous vendors delivering agentic identity solutions. A sample of those have capabilities with respect to ownership discovery and assignment. </p><h3>Aembit</h3><p>https://aembit.io/iam-for-agentic-ai/ </p><p>Aembit uses a &#8216;Blended Identity&#8217; model that cryptographically combines the AI agent&#8217;s non-human identity with the human user operating it at authentication time. It integrates with existing IdPs (Okta, Azure AD, Google) via OIDC/OAuth 2.1 so every access request carries verifiable human context. The human is not discovered post-hoc &#8212; they are bound into the access token at session initiation.</p><h3>Andromeda Security</h3><p>https://www.andromedasecurity.com/use-case/agentic-ai </p><p>Andromeda explicitly offers a &#8216;Human Ownership and Governance&#8217; capability. It identifies and certifies human owners for each discovered agent, runs ownership and access review campaigns, and enforces least privilege based on confirmed ownership. The platform maintains a centralised inventory mapping agents to humans and supports ongoing certification cycles.</p><h3><strong>Clutch Security</strong></h3><p>https://www.clutch.security/use-cases/workforce-attribution</p><p>Clutch has a dedicated &#8216;Workforce Attribution&#8217; use case that reveals every human-NHI relationship &#8212; creator, owner, user, or value exposer &#8212; for the full NHI estate including AI agents. Its Identity Lineage&#8482; feature aggregates and correlates data from Cloud, SaaS, Code/CI-CD, Vaults, and on-prem environments to build a visual map of origin, consumers, attribution to the workforce (owners/creators), storage, and resources. Shadow AI Discovery surfaces unmanaged agents, and the Agentic AI Governance module controls how agents use and share NHIs.</p><h3><strong>Entro Security</strong></h3><p>https://entro.security/platform-ai-agents/</p><p>Entro automatically correlates agent activity with human users through logs, code commits, and device telemetry, then enforces ownership via policies, alerts, and automation. Its AGA module uses three data layers &#8212; Sources (EDR telemetry, agent foundries like AWS Bedrock/Copilot Studio, cloud environments, MCP servers), Targets (enterprise systems the agent touches), and Identities (human/NHI/secrets) &#8212; to build a complete agent profile and attribute each agent to a creator/owner. Ownership is then enforced through access review campaigns aligned with IGA principles.</p><h3><strong>Microsoft Entra (Agent ID)</strong></h3><p>https://www.microsoft.com/en-gb/security/business/identity-access/microsoft-entra-agent-id</p><p>Microsoft Entra Agent ID (in public preview) introduces a formal &#8216;Sponsor&#8217; model: every agent identity must have one or more human sponsors, who are accountable for its lifecycle and access decisions. Sponsors are assigned at creation or via the admin centre. If a sponsor leaves the organisation, their sponsorship is automatically transferred to their manager via lifecycle workflows, ensuring no agent becomes ownerless. Access packages requiring sponsor approval enforce human accountability at each access request. The Agent Identity Blueprint also records publisher, roles, and permissions at the type level. Both attended (on-behalf-of OAuth OBO flow, tying the agent to an authenticated human) and unattended (autonomous) modes are supported.</p><h3><strong>Oasis Security</strong></h3><p>https://www.oasis.security/product#ownership</p><p>The Oasis NHI Ownership Discovery Engine uses purpose-built AI/ML algorithms to suggest and assign owners by analysing the digital footprint and behaviours of those who consume NHIs &#8212; without requiring pre-existing metadata, tags, or naming conventions. Its AAM&#8482; product tracks a full chain of custody: Human &#8594; Agent &#8594; Prompt &#8594; Intent &#8594; Policy &#8594; Identity &#8594; Actions &#8594; Results. Ownership recommendations are automated and then attested by security teams. The platform also covers ownership succession and flags orphaned agents when creators leave.</p><h3><strong>SailPoint</strong></h3><p>https://www.sailpoint.com/products/agent-identity-security</p><p>SailPoint&#8217;s Agent Identity Security (AIS) product formally certifies AI agents by assigning clear human owner and user accountability, enforcing permissions, and linking agents to the identity context of the users they represent and the data they access. Owners are aggregated from cloud and agent platforms (AWS, Azure, GCP, Salesforce, Copilot Studio) and can have multiple owners per agent. Ownership data is maintained for audit and succession planning &#8212; when an owner changes roles or leaves, ownership is quickly reassigned without losing visibility. SailPoint&#8217;s unified platform governs human, machine, and agent identities together, enabling consistent access review certifications across all identity types.</p><h3>Saviynt</h3><p>https://saviynt.com/blog/ai-agent-lifecycle-management</p><p>Saviynt&#8217;s view is that if registration establishes the  identity, ownership establishes accountability&#8212;and without it, governance collapses into ambiguity. Every AI agent must have a named, accountable owner from day one, and that ownership must persist and be enforced throughout its lifecycle. AI agents do not belong to systems; they belong to a human sponsor, a team, and a defined business purpose. This means a specific individual&#8212;not a shared mailbox&#8212;is responsible for the agent&#8217;s behaviour, access, and compliance, with clear alignment to business and executive oversight. </p><p>Saviynt identifies owners by leveraging authoritative sources such as HR systems and identity directories to map agents and accounts to real individuals and reporting structures. It correlates access patterns, entitlement usage, and system relationships to infer likely ownership where it is not explicitly defined. These inferred owners are then validated through governance workflows, such as certification campaigns and attestation, to establish and confirm accountability.</p><h3><strong>Token Security</strong></h3><p>https://www.token.security/use-cases/establish-ai-agent-ownership-and-accountability</p><p>Token Security has a dedicated &#8216;Establish AI Agent Ownership and Accountability&#8217; use case. It automatically discovers every AI agent (custom GPTs, autonomous services, MCP servers, coding agents) and assigns clear human and departmental ownership to each. Orphaned agents &#8212; those without a responsible owner or linked to a departed employee &#8212; are flagged, and ownership assignment is enforced. Token&#8217;s unified identity graph correlates AI agents, humans, secrets, permissions, and data to reveal blast radius. Intent-based controls (declared and observed agent intent) further align permissions to agent purpose.</p><h3><strong>Twine Security</strong></h3><p>https://www.twinesecurity.com/use-cases/account-ownership-integrity</p><p>Twine&#8217;s AI employee &#8216;Alex&#8217; specifically identifies orphaned accounts &#8212; users/agents that have access but no valid owner &#8212; investigates which employee should be responsible for each account, and updates the record with the correct owner. This is an active investigation workflow rather than passive metadata correlation. Alex integrates with existing IGA platforms and improves the efficiency of access certification by providing richer context to managers during reviews.</p><h3>Other Vendors of Note</h3><p>Anetac, Astrix Security, Eqty Lab, Knostic AI, Radiant Logic, SecureAuth, Sonrai Security, Teleport</p><div><hr></div><h2>Recommendations</h2><ul><li><p>For shadow AI / legacy environments (no existing metadata): Prioritise vendors with AI/ML-based correlation approaches.</p></li><li><p>For Microsoft-centric organisations: Microsoft Entra Agent ID provides the deepest native integration with existing Entra governance tooling and the most formally specified ownership succession model.</p></li><li><p>For organisations prioritising cryptographic accountability look to see if vendors support the ability for per-session linking of human tokens to agent access materials.</p></li><li><p>For organisations with mature IGA programmes look to see if existing access governance can be built upon a foundation of linking agents to human reviewers via additional context</p></li></ul><div><hr></div><p><strong>About The Author</strong></p><p>Simon Moffatt has over 25 years of experience in IAM, cyber, and identity security. He is the founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a>, a specialist research and advisory firm based out of the UK. He is the author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker, and a strategic advisor to entities in the public and private sectors.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/payg-1hr-vendor-discussion?back=1&quot;,&quot;text&quot;:&quot;Book Consultation to Discuss&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/payg-1hr-vendor-discussion?back=1"><span>Book Consultation to Discuss</span></a></p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://radar.thecyberhut.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://radar.thecyberhut.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The Cyber Hut Radar - Emerging Technology Research</span></a></p><p>Last updated 16 April 2026</p>]]></content:encoded></item><item><title><![CDATA[Claude Mythos and Project Glasswing: The End of Cyber Security As We Know It?]]></title><description><![CDATA[Analyst Comment]]></description><link>https://radar.thecyberhut.com/p/claude-mythos-and-project-glasswing</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/claude-mythos-and-project-glasswing</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 10 Apr 2026 10:40:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U6if!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Analyst Comment</h2><p>Anthropic recently announced something called <a href="https://www.anthropic.com/glasswing">Project Glasswing</a>. A partnership with leading technology vendors to improve cyber security. Organisations such as Microsoft, Palo Alto, Nvidia and Cisco were part of an initial consort of 12 companies that have been given access something called <a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos.</a> Mythos is a new frontier model that is not currently available for general release.</p><p>Whilst not created specifically for cyber related tasks, it has emerged at being highly effective at finding and in turn writing exploits against existing software.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U6if!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U6if!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!U6if!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!U6if!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!U6if!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U6if!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:118985,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/193777338?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U6if!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 424w, https://substackcdn.com/image/fetch/$s_!U6if!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 848w, https://substackcdn.com/image/fetch/$s_!U6if!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 1272w, https://substackcdn.com/image/fetch/$s_!U6if!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c08413-1ad7-41c4-9da7-85c810fddfff_3840x2160.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Image</strong> <strong>Source</strong>: red.anthropic.com blog</p><div><hr></div><p>In a <a href="https://red.anthropic.com/2026/mythos-preview/">blog</a> on the red.anthropic.com site, numerous zero day vulnerabilities were found across a range of operating systems, cryptographic libraries and web applications. Many several decades old. The model then in turn - and often autonomously - wrote exploits against those vulnerabilities. In hours and days.</p><h4>Why is this important? What impact does this have?</h4><p>The use of models for vulnerability identification is not new. The interesting aspect is clearly the speed and effectiveness at which this can now be achieved, across a broad array of software platforms and libraries. Human involvement is still there - with scaffolding and prep work, but in reality, once operating, the model will iteratively identify and at times chain together issues that can lead to severe system compromise or denial of service. It is almost like a magic wand pentester.</p><p>Anthropic are not making this model available for general release currently - for obvious reasons. They are amassing an arsenal of zero day vulnerabilities and exploits that many providers will take several months to fix. In the wrong hands of course would have significant consequences. I guess in turn, that makes Anthropic a target?</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YTdy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YTdy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 424w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 848w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 1272w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YTdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png" width="1157" height="574" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:574,&quot;width&quot;:1157,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:461035,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/193777338?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YTdy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 424w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 848w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 1272w, https://substackcdn.com/image/fetch/$s_!YTdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d06ec26-6bdf-4bdd-b4ae-de4eda0657a1_1157x574.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Image</strong> <strong>Source</strong>: Anthropic site</p><p>Alas, Project Glasswing is an initiative to take this frontier model and support a defensive position first - by enabling this select first group of technology providers (with 40 others in next level discussion) about how they can strengthen either their own or their clients&#8217;s infrastructure.</p><p>What are the immediate impacts?</p><ol><li><p>Vulnerability management has become a commodity capability</p></li><li><p>Triage, Remediation and Response may become an immediate bottleneck</p></li><li><p>Immediate defensive position may become weakened</p></li><li><p>Longer term defensive position becomes strengthened</p></li><li><p>The speed and accuracy of patch code should dramatically improve</p></li></ol><p>Clearly this is a new era in both cyber security offensive and defensive operations - but not necessarily an entire sea-change. As with all technology change, there will be an asymmetric distribution in the usage and in turn benefits. Whilst clearly adversary activity is likely already using existing models in an offensive way, over time the intention (and I believe a realistic one) is that code vulnerabilities reduce from day 0 and in turn future issues will be continually (instead of periodically) identified and in turn resolved before full exploit.</p><p>If the majority of adversarial attacks rely upon unpatched systems and zero-day exploitation, that must surely be a good strategic position to take.</p><div><hr></div><h2>AI Generated Summary of Claude Mythos Assessment</h2><p>The Anthropic <em>Mythos Preview</em> blog describes a <strong>step-change in AI capability</strong>, particularly in cybersecurity, that signals the beginning of a new era in software vulnerability discovery and exploitation.</p><div><hr></div><h3>1. A fundamental leap in AI capability</h3><p>Mythos Preview is Anthropic&#8217;s most advanced model to date, with major improvements in:</p><ul><li><p>reasoning</p></li><li><p>software engineering</p></li><li><p>autonomous task execution</p></li></ul><p>Crucially, its cybersecurity abilities are <strong>not the result of specialised training</strong>, but emerge from general advances in these core capabilities.</p><p>This suggests that <strong>powerful offensive cyber capabilities may become a default property of advanced AI systems</strong>.</p><div><hr></div><h3>2. From bug discovery &#8594; exploit generation</h3><p>Previous AI models were already strong at finding vulnerabilities, but Mythos changes the balance:</p><ul><li><p>Can discover <strong>zero-day vulnerabilities</strong></p></li><li><p>Can <strong>build working exploits</strong>, not just identify bugs</p></li><li><p>Can chain vulnerabilities into full system compromise</p></li></ul><p>Benchmarks show a dramatic increase in exploit success rates compared to earlier models, indicating that AI is moving from <strong>analysis &#8594; operational capability</strong>.</p><div><hr></div><h3>3. The &#8220;new zero-day era&#8221;</h3><p>The blog frames this as a shift in <strong>tempo</strong>, not just capability:</p><ul><li><p>AI can find vulnerabilities faster than they can be patched</p></li><li><p>Disclosure and remediation processes are no longer sufficient</p></li><li><p>The backlog of unpatched vulnerabilities becomes a systemic risk</p></li></ul><blockquote><p>The key change is not just better tools&#8212;it&#8217;s that <strong>AI accelerates the entire vulnerability lifecycle</strong></p></blockquote><div><hr></div><h3>4. Dual-use risk: defenders vs attackers</h3><p>Anthropic explicitly highlights a <strong>transitional risk period</strong>:</p><ul><li><p>Defenders can use Mythos to find and fix vulnerabilities</p></li><li><p>But attackers could use similar models to weaponise them</p></li></ul><p>This creates a scenario where:</p><ul><li><p>short-term advantage may favour attackers</p></li><li><p>long-term advantage depends on how responsibly models are deployed</p></li></ul><div><hr></div><h3>5. Controlled release as a policy response</h3><p>Because of these risks, Mythos is <strong>not publicly released</strong>.</p><p>Instead, Anthropic launched <strong>Project Glasswing</strong>, giving access only to:</p><ul><li><p>major tech companies</p></li><li><p>infrastructure providers</p></li><li><p>security organisations</p></li></ul><p>The goal is to:</p><ul><li><p>patch vulnerabilities before wider model release</p></li><li><p>adapt industry processes to AI-driven discovery</p></li></ul><div><hr></div><h3>6. Implications for cybersecurity</h3><p>The blog&#8217;s core message is that <strong>security assumptions must change now</strong>:</p><ul><li><p>Vulnerability discovery will be <strong>continuous and automated</strong></p></li><li><p>Exploit development will become <strong>faster and more accessible</strong></p></li><li><p>Patch cycles and validation workflows must accelerate</p></li></ul><p>This is effectively the beginning of:</p><blockquote><p><strong>AI-native cybersecurity&#8212;where both attack and defence are machine-driven</strong></p></blockquote><div><hr></div><h2>About The Author</h2><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8211; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><p>Book an <a href="https://calendly.com/simonmof/payg-1hr-vendor-discussion?back=1&amp;month=2026-03">inquiry consultation</a> to discuss any of the above concerns.</p><div><hr></div><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Review of RSAC 2026]]></title><description><![CDATA[A retrospective on emerging security trends from the 35th anniversary of the key conference]]></description><link>https://radar.thecyberhut.com/p/review-of-rsac-2026</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/review-of-rsac-2026</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 31 Mar 2026 08:22:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AfHC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week I travelled over to San Francisco for the <a href="https://www.rsaconference.com/library/video/rsac-conference-35th-anniversary">35th edition</a> of the <a href="https://www.rsaconference.com/">RSAC</a> conference. I joined over 40,000 security professionals from around the globe all wondering if AI can be &#8220;secured&#8221; - by what and how. We got <em>some</em> answers to that during week - for which I will return later - but perhaps that wasn&#8217;t necessarily the main question we should have been trying to answer. More on that too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AfHC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AfHC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 424w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 848w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 1272w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AfHC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18629380,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AfHC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 424w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 848w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 1272w, https://substackcdn.com/image/fetch/$s_!AfHC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I have personally being going to RSAC for over 15 years, and this was the 5th consecutive  year of taking <a href="https://www.thecyberhut.com/">The Cyber Hut</a> there as an analyst firm. </p><p>Even in that relatively short half-decade, technology, world events and business needs have iterated hugely - often going through the entire invention-innovation-obsolescence cycle. I think the biggest contribution AI is currently making, is the significant reduction in time that cycle is taking to complete - which in turn is driving further adoption of AI, but also making the measurable impact more tangible. </p><div><hr></div><h2>Show Floor Splashes</h2><p>Let&#8217;s be clear, if your vendor booth wasn&#8217;t &#8220;securing AI&#8221;, &#8220;discovering agents&#8221;, &#8220;being the AI control plane&#8221; your marketing team wasn&#8217;t on point. The fascinating thing of course, is that many vendors claiming these capabilities were - 12 months ago - likely to be non-competitive with one another. What does that tell us?</p><p>Firstly there is a lot of froth and marketing fluff emerging from many vendors as it pertains to AI security. Secondly, many of the topics that numerous small and emerging technology vendors were trying to solve 12-18 months ago were clearly not attacking the correct problem statements.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EAIy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EAIy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 424w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 848w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 1272w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EAIy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png" width="1456" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9973344,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EAIy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 424w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 848w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 1272w, https://substackcdn.com/image/fetch/$s_!EAIy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b9aa0ac-ce35-4f74-b143-4317c655057a_3264x1746.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Of course, there are many vendors who <strong>are</strong> developing some series capabilities to secure the AI world. But not all AI is the same. Firstly AI is hugely broad and equally it will take a &#8220;village&#8221; to secure both the end to end usage of AI - including the building blocks such as agents, MCP, models and tools - as well as the most critical aspect of all: the thing which makes AI tick, is of course data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3zKJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3zKJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 424w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 848w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 1272w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3zKJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png" width="880" height="716" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:880,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68836,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3zKJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 424w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 848w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 1272w, https://substackcdn.com/image/fetch/$s_!3zKJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc894b17c-6dd2-4dd1-a2b3-ddeac597769a_880x716.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So by association it is quite legitimate to see so many vendors from a broad ecosystem of security to be promoting and gravitating to the AI world. No one single vendor or even platform will be able to handle this complexity today. And I suffix &#8220;today&#8221; to that statement as things may well change - as a result of the <em>use </em>of AI to the extent that consolidation, feature innovation and understanding, may well allow multiple aspects of the AI world to be secured from a single source.</p><p>But we need to first understand AI:</p><ul><li><p>has lots of moving parts</p></li><li><p>interacts with humans - remember those?</p></li><li><p>should be designed with higher level objectives in mind</p></li><li><p>will be influenced by external factors such as ethics and compliance</p></li></ul><p>So the show floor was dominated by AI - from the data, identity, endpoint and operations worlds. These are big broad buckets for sure, but these pillars have many existing concepts that can be applied to the AI world. A few interesting questions and use cases though I feel are not necessarily getting the attention they deserve.</p><p>We also need to consider:</p><ul><li><p>How AI links to human actions, ownership and risk</p></li><li><p>Who or what can access an agent - not just what the agent can do</p></li><li><p>How to manage the AI-mesh</p></li></ul><p>This AI-mesh concept is emerging more and more with the B2C identity world. Typically the modus-operandi for B2C identity is for the service provider to try and deliver personalised experiences for an end user - and in turn be a position to engage more and sell more. To do this of course the service provider requires data - which brings in a privacy conflict (see <a href="https://amzn.eu/d/0ci6BTQC">CIAM Design Fundamentals</a> for why this occurs and how it can solved) and a primary need to &#8220;own the user identity&#8221;. </p><p>The introduction of agentic AI can potentially create a barrier between a service provider and a consumer or purchaser of a service. This was discussed in detail on <a href="https://www.youtube.com/watch?v=3YFKMLq_qJs">episode 70 of The Analyst Brief podcast</a> and it will be interesting to see if this does materialise into a real issue.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6O-F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6O-F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 424w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 848w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 1272w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6O-F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png" width="880" height="716" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:880,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:117897,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6O-F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 424w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 848w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 1272w, https://substackcdn.com/image/fetch/$s_!6O-F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f0899d-69a8-409c-ab1f-39ee70803ada_880x716.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I guess the AI-mesh may ultimately end up to be a &#8220;robot wars&#8221; style evolution - with agent to agent being the standard interaction model, which in turn is a race to the bottom with respect to having only AI being the apparatus that can truly interact with and ultimately secure other AI components.</p><p>From the show floor, the immediate capabilities that have emerged into relatively stable value points:</p><ol><li><p><strong>Discovery</strong> - being able to rapidly find AI components - be that agents running, shadow AI services being used and MCP services deployed</p></li><li><p><strong>JiT</strong> - being able to at least design a just in time access model for agents, so they only have the access they need for a very short period of time</p></li><li><p><strong>Behaviour</strong> - being able to monitor agent behaviour to identify malicious intent, changes in usage or optimization steps that look dangerous or damaging</p></li><li><p><strong>Ownership</strong> - whilst acknowledged as being vitally important, the approach and consistency here for linking agents to carbon life forms is lacking a little</p></li></ol><div><hr></div><h3>The Cyber Hut Recent AI Research</h3><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c6e13bd4-8924-49fb-a8b1-8088e3e10f13&quot;,&quot;caption&quot;:&quot;As AI agents become more autonomous and deeply embedded in modern systems, they&#8217;re no longer just tools&#8212;they&#8217;re active participants. They access data, trigger workflows, and interact across platforms with minimal human intervention. Yet despite this growing responsibility, most AI agents still rely on outdated authentication methods never designed for n&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Do Agents Need A Cryptographic Identity?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-03-17T11:17:41.415Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!9IVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/do-agents-need-a-cryptographic-identity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:191239024,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;5a43af60-b45e-44e3-b9a2-cb75dab02436&quot;,&quot;caption&quot;:&quot;AI agents have the potential to drive huge disruption to an array of use cases and benefactors across nearly all sectors of the global economy. From healthcare and public services, to more productive use of employee time and improving eCommerce and online interactions, it seems AI and the use of agents can deliver material impact for&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Industry Webinar: Identity-First Security for AI Agents&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-08-06T09:25:06.729Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!QKAH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbef9d065-444c-48d7-ac4d-440e33b14e79_960x540.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/industry-webinar-identity-first-security&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:169818426,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;61e7a561-784e-48c3-b963-53b31db8c0db&quot;,&quot;caption&quot;:&quot;Agent Identity and Access Management&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cheat Sheet: Agentic-AI Security Architecture Example&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2026-02-17T12:46:12.060Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188254238,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h2>Topical Talks</h2><p>Whilst most of my time was in vendor briefings and show floor hopping I did manage to get some live session action in - and as always I tried to select a broad cross-section of topics.</p><h4>Star Dot Typhoon </h4><p>My first session, was literally the first talk of the week and a Day 1 0830 start to listen to <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755872064491001pUF2">Inside the Hunt for China&#8217;s Typhoons: Disrupt, Deter, and Defend</a>. The &#8220;typhoon&#8221; campaigns have brought some considerable disruption to numerous private sector entities. These attacks are being attributed to Chinese nation state actions - but with some subtle nuances between Volt Typhoon and Salt Typhoon with respect to attribution, behaviours and more importantly defensive response.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NfOC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NfOC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 424w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 848w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 1272w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NfOC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png" width="1456" height="683" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:683,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3725314,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NfOC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 424w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 848w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 1272w, https://substackcdn.com/image/fetch/$s_!NfOC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb47096c7-1b1b-4763-ade5-c7d31fbe7a22_3264x1531.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If Salt Typhoon was focused more on espionage and knowledge collection, Volt Typhoon was being classified as &#8220;military pre-positioning&#8221; and unpicking the why with strong attribution in turn helps defensive actions be more focused.</p><p>This defensive response of course relies on threat intelligence sharing - and the link between public agencies and private enterprise and in turn between private enterprises (who may well be competitive in their respect sectors) has been brought up on numerous occasions, with no real solution to strategically improve this. The talk ended with a discussion on the &#8220;hack back&#8221; option - and whilst this may well be  &#8220;off the table&#8221; with respect to recent US cyber strategy, it generated several audience questions around pro-actively defending core assets.</p><p>As an aside, the number one recommendation with respect to lessons learnt was of course <strong>identity-centric defense</strong>. Not only from an attribution point of  (knowing who and what has strongly authenticated) but by analysing account behaviour, permissions usage and the like, can strongly help with intent analysis too.</p><h4>Drones Need Identities Too</h4><p>Another talk that caught my eye was entitled <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1756056173054001UOV6">Beyond the Fence: Securing Our Skies from the Drone Threat</a>. Whilst this may seem like an obvious candidate for both military and physical related security discussion, it was rapidly boiled down into a cyber and more specifically an identity related issue. Whilst the threat vector has moved from being 2D to 3D - the digital and logical side of drone management has become a major issue. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GKMO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GKMO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 424w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 848w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 1272w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GKMO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png" width="1456" height="840" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:840,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8972970,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GKMO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 424w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 848w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 1272w, https://substackcdn.com/image/fetch/$s_!GKMO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd88569e-1c87-4075-8011-2cefbf18afa0_3264x1884.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The rise of anonymous drone activity across many US cities in recent years has sky rocketed - with a lack of both drone identifier information but also lineage of drones to physical people. Sound familiar? It&#8217;s exactly the same conceptual use case for both non-human identity and agentic usage today. First discover all instances, then remove anonymous entities and then apply risk analysis functions. </p><p>There is a basic &#8220;remote ID&#8221; concept but lacks integrity protection, is optional and also doesn&#8217;t necessarily contain information relating to the physical owner. It would seem the most sensible option to bind the drone to an owner on purchase. Likely via a mobile app with strong MFA. There are numerous existing standards here that could help - from FIDO for authn, but also OAuth2 Device Authorization grant perhaps too - allowing the drone to &#8220;act on a user&#8217;s behalf&#8221;. Preventing the drone from powering on until an owner had been authenticated may not fly (pun intended) commercially but seems like the most sensible way of improving lineage and trust.</p><h4>Venture Capital + AI = Market Transformation?</h4><p>One of the first sessions on the final day brought not only coffee requirements but some insight from the VC and investment world on how they are viewing the AI revolution: what might happen next, how they evaluate AI startups and what might happen to the existing incumbents. </p><p><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1756087123178001dhi0">The AI Gold Rush in Cybersecurity: Where Venture Dollars Go</a> was a great panel and the amplification of a &#8220;gold rush&#8221; is so apt.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XBfX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XBfX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XBfX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:344111,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XBfX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XBfX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86396f56-e94b-476b-bc75-6b46297475ef_2016x1512.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The concept of a trillion dollar cyber security company emerged and will AI make this possible? The industry pendulum moves consistently between best of breed and best of suite and will AI accelerate either of these end goals? </p><p>Some interesting points were made about how AI is impacting existing market trends - namely that feature implementation and code generation is increasing innovation. So platform providers can rapidly add new capabilities at the edge of their core competency - namely as building stuff now takes less time. That in turn has had a knock on with respect to merger activity. It will be interesting how long that continues for, but for sure, feature differences between organisations is becoming extremely narrow. </p><div class="poll-embed" data-attrs="{&quot;id&quot;:485370}" data-component-name="PollToDOM"></div><p>But having features alone is no longer enough. The &#8220;Balkanisation&#8221; of markets and the general anti-American global sentiment is what Dave DeWalt says will be one of the key issues in the coming period with respect to how to get to being a trillion dollar business. How can vendors aim to deliver global services to different geographic markets, with different compliance, sovereignty and supply chain constraints? Does AI help or hinder this?</p><p>They also brought up the interesting maturity of companies such as Salesforce, ServiceNow and Mastercard who now have significant cyber security offerings when historically that has not been their core aim. Will this trend continue, with essentially ever organisations providing cyber capabilities at some level?</p><h4>Midnight at the War Room</h4><p>The final talk I caught, was literally one of the final sessions on the final day. A distinguished panel of Chase Cunningham (Dr Zero Trust), Sarah Gosler, former Deputy Director of the NSA Chris Inglis and RSAC exec and cyber luminary Jen Easterley dived into the <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1770858769987001vKR0">world of cyber warfare</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_5UN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_5UN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 424w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 848w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 1272w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_5UN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png" width="1456" height="947" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:947,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10180729,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_5UN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 424w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 848w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 1272w, https://substackcdn.com/image/fetch/$s_!_5UN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a6fb951-41bf-413a-85ef-982f307a1a78_3264x2124.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The panel was supporting and showcasing clips of an up and coming documentary called &#8220;<a href="https://www.semperis.com/midnight-in-the-war-room/">Midnight in the War Room</a>&#8221; being developed by Semperis. The full documentary will be released in August at Blackhat USA but the panel gave some interesting glimpses into what cyber war in 2026 really means, how it&#8217;s evolving and what can be done to respond to it.</p><p>The most headline catching line was likely delivered by Chase, articulating that &#8220;if your dog is wearing an Internet-enabled dog collar, it&#8217;s part of the battle field!&#8221;. Meaning that we are now entering an age where digital and cyber warfare is real - and the private sector has become the 6th domain of war fare after land, air, sea, space and cyber.</p><div><hr></div><h2>Innovation Sandbox</h2><p>The annual <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1765306496145001Wifg">innovation sandbox</a> is a chance for early stage cyber vendors to pitch in front of both an esteemed panel put together by RSAC as well as a few hundred audience members. Each vendor gets exactly 3 minutes to pitch their idea, vision and strategy before being grilled by the panel. An hour or so deliberation results in a winner - with funding and glory - with each of the 10 finalists receiving a healthy $5 Million to boost their growth.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6mGk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6mGk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 424w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 848w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 1272w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6mGk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png" width="1456" height="917" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:917,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10429662,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6mGk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 424w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 848w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 1272w, https://substackcdn.com/image/fetch/$s_!6mGk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5149fdfe-42ae-4deb-b094-1e87b429238c_3264x2056.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The winner of the accolade of &#8220;most innovative startup 2026&#8221; went to <a href="https://www.geordie.ai/">Geordie AI</a> with their AI governance platform. An end to end view of usage as well as linkage to human ownership were core mentions. They describe themselves as &#8220;<em>Geordie gives your organization a holistic, real-time understanding of its agentic footprint, whether agents are locally coded, self or SaaS hosted, or built on low or no-code platforms. Geordie combines behavioral observability and posture context to build a living picture of how agents operate.&#8221;. </em></p><p>Numerous startups during the week talked the same talk. Time will tell which wins out.</p><p>Other participants included:</p><ul><li><p>ZeroPath - looking to improve app sec scaling</p></li><li><p>Token Security - improving identity security for NHI and agents</p></li><li><p>Realm Labs - detection and response for AI with a deep neural scanner</p></li><li><p>Humanix - improving social engineering detection and response</p></li><li><p>Glide Identity - reducing login phishing with SIM authentication</p></li><li><p>Fig - security operations optimization</p></li><li><p>Crash Override - becoming the control for software development life cycle</p></li><li><p>Clearly AI - compliance, data and privacy security analyser and assessment</p></li><li><p>Charm Security - scam and fraud prevention platform using agents</p></li></ul><div><hr></div><h2>Early Stage Standouts</h2><p>In addition to both the Innovation Sandbox and the main vendor show floor expo, there is the <a href="https://www.rsaconference.com/usa/expo-and-sponsors/early-stage-expo?_gl=1*fhbikh*_gcl_aw*R0NMLjE3NzM2ODAzNzguQ2p3S0NBancxTjdOQmhBb0Vpd0FjUGNocF9aWFVMOGJBeGlmMU04NjdxVDNFbnVaV3gyYW1NR1JoQ3FDYnRZQURBNEczNk9iaG93aWpSb0NrUlFRQXZEX0J3RQ..*_gcl_au*NDI3ODY5OTU0LjE3Njc2MTAyNDg.*_ga*MjA1MTQ0MzU2Ny4xNzU5Mzk0NzYx*_ga_Q3JZKF3KQM*czE3NzQ3MTQwNjckbzI2JGcxJHQxNzc0NzE3MjM2JGozNyRsMCRoNDg4ODAwMDI2">Early Stage Expo</a> - which is essentially a combination of the two. Around 80 vendors - some entirely new, some with a bit of funding and a year or two in the market - exhibit and engage in prospect discussion. A few that caught my attention from an identity point of view:</p><ul><li><p>12 Port Inc - looking to reinvigorate the privileged access space</p></li><li><p>Identity Rules - a Mexico based ITDR and identity behaviour startup</p></li><li><p>Klyro - IGA focused helping to accelerate application onboarding</p></li><li><p>WideField Security - visibility and behaviour monitoring</p></li><li><p>Hush Security - NHI and machine security platform</p></li></ul><div><hr></div><h2>Vendor Briefing Shout Outs</h2><p>A quick shout out to vendors who I met with more formally to discuss their product, sales and technical go to market updates. It is always exciting to get updates from so many smart and innovative leaders, passionate to help solve some of today&#8217;s most pressing identity and cyber security problems. Over the week I spoke with:</p><ul><li><p><a href="https://www.andromedasecurity.com/">Andromeda Security</a> - &#8220;<em>Intelligently discover, secure, and govern AI agents, humans, and NHIs&#8212;driven by risk and behavioral context.&#8221;</em></p></li><li><p><a href="https://www.appviewx.com/">AppViewX</a> - &#8220;<em>Automate certificate management and PKI. Govern agentic and machine IAM. AppViewX secures enterprises for the AI and quantum era.&#8221;</em></p></li><li><p><a href="https://www.axiad.com/">Axiad</a> - <em>&#8220;Trusted Identity. At the speed of now.&#8221;</em></p></li><li><p><a href="https://cy4datalabs.com/">Cy4Data Labs</a> - <em>&#8220;Unlimited Encryption Keys. Unbreakable Security. Zero Performance Impact.&#8221;</em></p></li><li><p><a href="https://www.britive.com/">Britive</a> - <em>&#8220;We don&#8217;t manage standing privileges. We eliminate them. One control plane, one policy, every identity.&#8221;</em></p></li><li><p><a href="https://www.cisco.com/site/uk/en/products/security/identity-services-engine/index.html">Cisco</a> - <em>&#8220;Leverage intel from across your stack to enforce policy, manage endpoints and deliver trusted access. Multi-cloud NAC with zero trust makes it possible.&#8221;</em></p></li><li><p><a href="https://delinea.com/">Delinea</a> - <em>&#8220;Redefining identity security for the agentic AI era&#8221;</em></p></li><li><p><a href="https://www.descope.com/">Descope</a> - <em>&#8220;Reduce user friction, prevent account takeover, and get a 360<strong>&#176;</strong> view of your customer and agentic identities with the Descope External IAM platform.&#8221;</em></p></li><li><p><a href="https://entro.security/">Entro Security</a> - <em>&#8220;Unified identity security and lifecycle across Non-Humans, AI Agents &amp; Humans&#8221;</em></p></li><li><p><a href="https://www.manageengine.com/identity-access-management.html">ManageEngine</a> - <em>&#8220;Secure and manage enterprise digital identities and<br>privileged access.&#8221;</em></p></li><li><p><a href="https://p0.dev/">P0 Security</a> - <em>&#8220;The P0 AuthZ Control Plane&#8482; makes production access fast, secure and easy to manage. No standing privilege, no manual overhead, no audit surprises.&#8221;</em></p></li><li><p><a href="https://pathlock.com/">Pathlock</a> - <em>&#8220;When traditional IGA isn&#8217;t enough, companies turn to Pathlock for compliant provisioning, fine-grained SoD analysis, user access reviews, privileged access, and continuous controls monitoring.&#8221;</em></p></li><li><p><a href="https://permiso.io/">Permiso</a> - <em>&#8220;Discover.Protect. Defend. Monitor All Identities In All Environments. Redefining identity security for the agentic AI era&#8221;</em></p></li><li><p><a href="https://www.plainid.com/">PlainID</a> - <em>&#8220;Agentic AI changes everything, Run-time Authorization makes it secure.&#8221;</em></p></li><li><p><a href="https://www.pqcee.com/">pQCee</a> - <em>&#8220;Be Quantum Ready. Start your quantum readiness journey early&#8221;</em></p></li><li><p><a href="https://www.unosecur.com/">Unosecur</a> - <em>&#8220;Discover, govern, and enforce least privilege for every AI agent, NHI and human identity across multi-cloud, SaaS, IdPs, and on-prem in run-time.&#8221;</em></p></li><li><p><a href="https://sgnl.ai/">Crowdstrike/SGNL</a> - <em>&#8220;SGNL sits at the center of your IAM architecture. It eliminates standing privilege and instantly adapts access when conditions change.&#8221;</em></p></li><li><p><a href="https://www.silverfort.com/">Silverfort</a> - <em>&#8220;Discover and protect every dimension of identity, everywhere. Human, machine or AI, cloud or on-prem&#8212;including systems that couldn't be protected before.&#8221;</em></p></li><li><p><a href="https://goteleport.com/">Teleport</a> - <em>&#8220;Teleport unifies identities &#8212; humans, machines, and AI &#8212; with strong identity implementation to speed up engineering, improve resiliency against identity-based attacks, and control AI in production infrastructure.&#8221;</em></p></li><li><p><a href="https://www.zluri.com/">Zluri</a> - <em>&#8220;Gain complete visibility into identities and access, automate governance, and continuously manage identity risk across your enterprise.&#8221;</em></p></li></ul><div><hr></div><h2>Pick of the Parties</h2><p>And finally&#8230;RSAC wouldn&#8217;t be RSAC without some legendary parties. Whilst the jeg lag inevitably kicked in, I did manage to float across the evenings to continue the networking, grab a beer and even on one night - shock horror - get away from RSAC entirely and see one of my favourite musicians, the iconic Johnny Marr former guitarist of The Smiths at the fantastic small venue the Great American Music Hall.</p><p>A few specific shout outs should be raised. Wednesday I attended the Security Founders' Oasis at the great Chinese restaurant Fang hosted by Leen, Ross Haleliuk (Venture in Security), Caleb Sima  (White Rabbit VC), Cimento AI and Paul Lanzi (IDenovate). Really packed party with a broad selection of startups and founder leaders.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sG1d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sG1d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 424w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 848w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 1272w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sG1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png" width="1456" height="1096" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1096,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9598865,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sG1d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 424w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 848w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 1272w, https://substackcdn.com/image/fetch/$s_!sG1d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ff90417-dfcb-488d-a031-153bfb69d7b7_3264x2456.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Monday I got to attend someone else&#8217;s podcast (instead of host <a href="https://www.thecyberhut.com/podcast/">The Analyst Brief</a>) for a change and watched a live recording of the <a href="https://www.siliconzombies.com/">Silicon Zombies</a> record an episode called 'The Art of the Possible in Cyber-security' with experts from Acalvio Technologies and accuknox over at the Embacadero Center.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7phz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7phz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7phz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7phz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7phz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7phz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2590584,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7phz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7phz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7phz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7phz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08b3a166-a39a-484c-abc3-d009522c3bb2_4032x3024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The final night on Wednesday I headed down to Yerba Buena bar for The Hive Reception hosted by Bugcrowd, HPE Networking, Menlo Security, and Unosecur - which should get the marks for the best craft beer during RSAC with a great Drakes Hazy IPA on draught.</p><p>After that was the Insight Partners ScaleUp party on Minna sponsored by Veeam, Teleport, Island and Delinea amongst others.</p><p>One final party shout out should really go to investors Thoma Bravo for hosting a great event at the Museum of Modern Art. A key highlight is yet another musical one, this time with Kings of Leon entertaining the cyber masses.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CVh3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CVh3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 424w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 848w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 1272w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CVh3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png" width="1456" height="806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:8225575,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CVh3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 424w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 848w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 1272w, https://substackcdn.com/image/fetch/$s_!CVh3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa682f0fc-aa8c-43d7-abaa-958550d6bcbf_3264x1807.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Final Comment</h2><p>From a technology point of view AI dominated. There&#8217;s no question. From how it can be protected to how it can be used within cyber. There are clearly lots of unknowns and lots of moving parts, but the innovation cycles are collapsing rapidly. Feature implementation has accelerated hugely. But whilst the &#8220;how to build&#8221; may have become easier with vibe coding and faster integrations, the &#8220;what to build&#8221; can still be tough.</p><p>As that needs humans. And I think that was a key underlying theme throughout the entire week. Either being explicitly called out in several of the key notes - specifically about the power of the community within cyber - but also more subtly when trying to understand where AI is taking us. </p><p>We must not forget the human-aspect within AI and technology in general. How we will integrate and use technology, the benefits (and potential damage) it can bring to us and our actions as responsible and accountable people.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LArl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LArl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 424w, https://substackcdn.com/image/fetch/$s_!LArl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 848w, https://substackcdn.com/image/fetch/$s_!LArl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!LArl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LArl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png" width="1456" height="1004" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1004,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9714884,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/192404691?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LArl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 424w, https://substackcdn.com/image/fetch/$s_!LArl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 848w, https://substackcdn.com/image/fetch/$s_!LArl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!LArl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F869db48a-87f7-4c34-9e11-2ff6c4973504_3264x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I guess this was brought to a funny pinnacle, with the actor Kevin Bacon (and this brother) encouraging a packed key note audience to become only one-degree away from a Bacon with a mass singalong. Let&#8217;s end it there.</p><div><hr></div><div id="youtube2--2LggnLxU-k" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-2LggnLxU-k&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-2LggnLxU-k?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h2>Further Resources</h2><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9c916cde-fb25-4095-9b9c-d5004693edad&quot;,&quot;caption&quot;:&quot;Last week saw over 40,000 people descend upon San Francisco for the annual RSAC Conference. Hundreds of sessions, over 600 vendors, plus the ever-growing innovation expo full of cutting edge startups all looking to solve some of today&#8217;s most complex security concerns.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Review of RSAC 2025&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-06T10:54:52.399Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!A_w6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6071664d-1df4-43c6-9fe6-2f3fa1419064_3698x2197.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/iam-at-rsac-2025&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:162957867,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2730abf8-363b-4d47-993e-28d2f2d27a5e&quot;,&quot;caption&quot;:&quot;This week I had the privilege of being an analyst attendee at the RSA Conference 2024 at the Moscone in San Francisco. This was the second year representing The Cyber Hut as the leading independent boutique analyst firm focused on emerging IAM technologies since we founded - and something like my 6th or 7th RSA overall.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;IAM at RSAC 2024: A review of Identity and Access Management at RSA Conference 2024&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:34112948,&quot;name&quot;:&quot;The Cyber Hut&quot;,&quot;bio&quot;:&quot;Identity &amp; Cyber Security Emerging Technology Research Specialists&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c960e4-4e27-4565-89d4-c37e48c4f703_300x300.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-05-13T11:12:05.238Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!PT8f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6929eea4-6e7b-4aa6-86ba-6cb06df9d1fd_1150x923.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://radar.thecyberhut.com/p/iam-at-rsac-2024-a-review-of-identity&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144577452,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1152167,&quot;publication_name&quot;:&quot;The Cyber Hut Radar - Emerging Technology Research&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Lq6a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>About The Author</h3><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8211; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors. </p><p>Book an <a href="https://calendly.com/simonmof/payg-1hr-vendor-discussion?back=1&amp;month=2026-03">inquiry consultation</a> to discuss any of the above vendors.</p><div><hr></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Hidden Risk of Fragmented Identity]]></title><description><![CDATA[And what can be done about it]]></description><link>https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 26 Mar 2026 14:18:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K-kJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As organisations scale across cloud, SaaS, and AI-driven environments, identity has become the <strong>primary control plane for security and access</strong>. Yet most enterprises still operate with a fragmented identity architecture&#8212;multiple tools, disconnected policies, and incomplete visibility.</p><p>This fragmentation is no longer just inefficient&#8212;it is <strong>a fundamental business and security risk</strong>.</p><div><hr></div><h2>The Problem: Identity Fragmentation at Scale</h2><p>Modern enterprises manage a rapidly expanding set of identities:</p><ul><li><p>employees and contractors</p></li><li><p>service accounts and APIs</p></li><li><p>cloud workloads and automation</p></li><li><p>emerging AI agents</p></li></ul><p>However, these identities are typically governed by <strong>multiple IAM systems operating in silos</strong>, often 6&#8211;16 different tools in a single organisation.</p><p>This creates a fragmented environment where:</p><ul><li><p>visibility is partial</p></li><li><p>policies are inconsistently enforced</p></li><li><p>identity relationships are poorly understood</p></li></ul><p>The result is an <strong>incomplete and unreliable view of access and risk</strong>.</p><div><hr></div><h2>What Can Be Done: Migration to Unified Identity</h2><p>The core need is for a <strong>unified identity model</strong>, often described as an <strong>&#8220;identity mesh.&#8221;</strong></p><p>This approach connects all identity systems&#8212;legacy, cloud, SaaS&#8212;into a single, orchestrated layer.</p><p>Key characteristics include:</p><h3>1. Centralised visibility</h3><ul><li><p>A complete inventory of all identities (human and non-human)</p></li><li><p>Clear mapping of permissions and relationships</p></li></ul><h3>2. Consistent policy enforcement</h3><ul><li><p>Unified access controls across all environments</p></li><li><p>Standardised authentication and governance</p></li></ul><h3>3. Continuous monitoring</h3><ul><li><p>Real-time tracking of identity behaviour</p></li><li><p>Detection of anomalies and misuse</p></li></ul><h3>4. Lifecycle orchestration</h3><ul><li><p>Integrated joiner&#8211;mover&#8211;leaver processes</p></li><li><p>Automated provisioning and deprovisioning</p></li></ul><div><hr></div><p>These concepts are part of an analyst comment series written for <a href="https://www.unosecur.com/">Unosecur</a>. The first <a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">article</a> is available to read now.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K-kJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K-kJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 424w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 848w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 1272w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K-kJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png" width="1243" height="873" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:873,&quot;width&quot;:1243,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:498444,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191585404?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K-kJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 424w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 848w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 1272w, https://substackcdn.com/image/fetch/$s_!K-kJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com"><span>Read More</span></a></p><div><hr></div><h3>About The Author</h3><p>Simon Moffatt has over 25 years of experience in IAM, cyber, and identity security. He is the founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a>, a specialist research and advisory firm based out of the UK. He is the author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker, and a strategic advisor to entities in the public and private sectors.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Why Isolated User Authentication Undermines Security]]></title><description><![CDATA[And destroys user productivity and happiness]]></description><link>https://radar.thecyberhut.com/p/why-isolated-user-authentication</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/why-isolated-user-authentication</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 24 Mar 2026 14:10:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hKjl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Modern identity systems are often designed with strong authentication technologies - fulti-factor authentication (MFA), biometrics, and passwordless methods in the digital space and possession based in the physical (site and building) domain.</p><p>Yet despite these advances, many organisations still suffer from weak identity assurance. The reason is not a lack of technology, but a failure in <strong>how identity is experienced across the user journey</strong>, that merges the physical and digital realms.</p><div><hr></div><h2>The Problem: Fragmented Access &amp; Authentication</h2><p>Most organisations treat identity as a series of disconnected events:</p><ul><li><p><strong>Enrolment</strong> (initial setup of credentials)</p></li><li><p><strong>Authentication</strong> (logging in)</p></li><li><p><strong>Recovery</strong> (password resets, account unlocks)</p></li></ul><p>In practice, these stages are often handled by <strong>different systems, policies, and processes</strong>. This leads to:</p><ul><li><p>inconsistent user experiences</p></li><li><p>duplicated credentials</p></li><li><p>gaps in assurance between steps</p></li></ul><p>If we then multiple this fragmentation across different systems and different scenarios across the physical and digital realms, we have a cascade of issues.</p><div><hr></div><h2>Why This Matters: Assurance Breaks at the Weakest Point</h2><p>Identity assurance is only as strong as its weakest link. Even if authentication is robust, weaknesses in enrolment or recovery can undermine the entire system.</p><p>For example:</p><ul><li><p>Weak identity proofing during enrolment allows false identities</p></li><li><p>Poor recovery processes enable account takeover</p></li><li><p>Inconsistent policies create exploitable gaps</p></li></ul><p>In a recent analyst comment <a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">article</a> written for <a href="https://www.hidglobal.com/?utm_source=radar.thecyberhut.com&amp;sourceURL=blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance">HID</a> I emphasise that <strong>recovery and reset processes are often the least secure parts of the journey</strong>. If this in turn is amplified by isolated physical and digital integration this problem becomes one of high risk and poor user experience.</p><div><hr></div><h2>What Can Be Done: Shift From Authentication to Journeys</h2><p>The key insight from the article is that identity should not be treated as isolated controls, but as a <strong>continuous, end-to-end journey</strong>.</p><p>This requires a move toward:</p><h2>1. Converged identity</h2><ul><li><p>A unified system across digital and physical access</p></li><li><p>Single identity spanning enrolment, authentication, and recovery</p></li></ul><h2>2. Continuous assurance</h2><ul><li><p>Identity confidence maintained over time, not just at login</p></li><li><p>Contextual signals (device, behaviour, location) informing access</p></li></ul><h2>3. Seamless user experience</h2><ul><li><p>Reduced friction through passwordless or adaptive authentication</p></li><li><p>Consistent processes across all identity interactions</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hKjl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hKjl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 424w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 848w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1272w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" width="861" height="838" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:838,&quot;width&quot;:861,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:703406,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191577927?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hKjl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 424w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 848w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1272w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com"><span>Read More</span></a></p><div><hr></div><h3>About The Author</h3><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8212; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">Consumer Identity &amp; Access Management: Design Fundamentals</a> and &#8220;IAM at 2035: A Future Guide to Identity Security&#8221;. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p>]]></content:encoded></item><item><title><![CDATA[Can We Solve The Broken Identity Journey?]]></title><description><![CDATA[Does a converged authentication solution exist?]]></description><link>https://radar.thecyberhut.com/p/can-we-solve-the-broken-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/can-we-solve-the-broken-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 20 Mar 2026 11:37:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EHhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Identity systems are under more pressure than ever. With more users, devices, and  AI-driven identities accessing more systems across a broader array of deployment models. But there&#8217;s a growing problem: the <strong>identity journey is broken</strong>.</p><h4>The Fragmentation Problem</h4><p>In many organisation, authentication is fragmented across multiple systems, tools, and environments. Employees move between physical access (badges, PINs) and digital systems (passwords, MFA, SSO), each with different processes for enrollment, login, and credential reset.</p><p>The result? A disjointed and inconsistent experience that creates what can only be described as <strong>credential chaos</strong>.</p><h4>More Friction, Less Security</h4><p>This fragmentation doesn&#8217;t just frustrate users&#8212;it actively undermines security.</p><p>Users are forced to manage multiple credentials and workflows, leading to frequent resets, workarounds, and mistakes. At the same time, IT teams struggle with rising support costs and operational complexity.</p><p>Critically, organisations lose <strong>end-to-end visibility</strong> of identity. There&#8217;s no reliable way to ensure that the person who entered a building is the same one accessing sensitive systems later.</p><h4>Identity Assurance Breaks Down</h4><p>Identity assurance&#8212;the confidence that someone is truly who they claim to be&#8212;depends on consistency across the entire access journey. But when authentication is siloed and inconsistent, that assurance collapses.</p><p>Security controls become difficult to enforce, measure, and scale. Integration between systems becomes fragile. Costs increase while trust decreases. </p><h4>The Case for Unified Authentication</h4><p>By unifying authentication across physical and digital environments, organizations can create a <strong>single, consistent identity journey</strong>. This results in:</p><ul><li><p>One cohesive authentication experience</p></li><li><p>Centralized visibility and control</p></li><li><p>Stronger, measurable identity assurance</p></li></ul><p>A unified approach not only improves security but also reduces friction and enables future scalability&#8212;especially as non-human identities continue to grow. </p><div><hr></div><p>This is a topic I wrote about in more detail in a recent analyst comment made for <a href="https://www.hidglobal.com/">HID</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EHhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EHhH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 424w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 848w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1272w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" width="698" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:698,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82712,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191240275?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EHhH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 424w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 848w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1272w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com"><span>Read More</span></a></p><div><hr></div><p><strong>About The Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8212; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">Consumer Identity &amp; Access Management: Design Fundamentals</a> and &#8220;IAM at 2035: A Future Guide to Identity Security&#8221;. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Apono Agent Priv Guard, Bravura IAM Insurance Controls, C1 2026 Future IAM Report, Omada new CEO]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/apono-agent-priv-guard-bravura-iam</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/apono-agent-priv-guard-bravura-iam</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 19 Mar 2026 10:25:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 style="text-align: center;">Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Curated Industry Announcements</h3><ul><li><p><strong>Aembit</strong>: <a href="https://aembit.io/blog/spiffe-vs-oauth-access-control-nonhuman-identities/?utm_source=radar.thecyberhut.com">SPIFFE vs. OAuth: Access Control for Nonhuman Identities</a></p></li><li><p><strong>Apono</strong>: <a href="https://www.prnewswire.com/news-releases/apono-launches-agent-privilege-guard-bringing-runtime-privilege-guardrails-to-enterprise-ai-agents-302717422.html">Apono Launches Agent Privilege Guard, Bringing Runtime Privilege Guardrails to Enterprise AI Agents</a></p></li><li><p><strong>AWS</strong>: <a href="https://aws.amazon.com/blogs/security/deploy-aws-applications-and-access-aws-accounts-across-multiple-regions-with-iam-identity-center/">Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center</a></p></li><li><p><strong>Bravura</strong> <strong>Security</strong>: <a href="https://www.bravurasecurity.com/blog/cybersecurity-insurance-compliance?utm_source=radar.thecyberhut.com">What Your Insurer Actually Wants to See in Your Identity Controls</a></p></li><li><p><strong>Cisco</strong>: <a href="https://blogs.cisco.com/security/cisco-access-manager-identity-based-access-control-that-lean-it-teams-can-deploy?utm_source=radar.thecyberhut.com">Cisco Access Manager: Identity-Based Access Control That Lean IT Teams Can Actually Deploy</a></p></li><li><p><strong>ConductorOne</strong>:<a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com"> 2026 Future of Identity Report</a></p></li><li><p><strong>Entro</strong> <strong>Security</strong>: <a href="https://entro.security/how-smart-should-your-secrets-rotation-technology-be/?utm_source=radar.thecyberhut.com">How smart should your secrets rotation technology be?</a></p></li><li><p><strong>Omada</strong>: <a href="https://www.prnewswire.com/news-releases/omada-appoints-jakob-h-kraglund-as-ceo-to-accelerate-global-growth-302716791.html">Omada Appoints Jakob H. Kraglund as CEO to Accelerate Global Growth</a></p></li><li><p><strong>Google</strong> <strong>Cloud</strong>: <a href="https://cloud.google.com/blog/products/serverless/iap-integration-with-cloud-run/">Simplify your Cloud Run security with Identity Aware Proxy (IAP)</a></p></li><li><p><strong>LoginRadius</strong>: <a href="https://www.loginradius.com/blog/engineering/model-context-protocol-mcp-security-risks?utm_source=radar.thecyberhut.com">Model Context Protocol (MCP): Security Risks Explained</a></p></li><li><p><strong>Sailpoint</strong>: <a href="https://www.sailpoint.com/press-releases/sailpoint-launches-shadow-ai-remediation?utm_source=radar.thecyberhut.com">Launches Shadow AI Remediation</a></p></li><li><p><strong>SpyCloud</strong>: <a href="https://spycloud.com/newsroom/annual-identity-exposure-report-2026/?utm_source=radar.thecyberhut.com">SpyCloud&#8217;s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft</a></p></li><li><p><strong>Strata</strong> <strong>Identity</strong>: <a href="https://www.strata.io/blog/continuity/secure-identity-for-tak-atak-at-the-tactical-edge/?utm_source=radar.thecyberhut.com">Secure Identity for TAK/ATAK at the Tactical Edge</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p>CO-PILOT, DISENGAGE AUTOPHISH: <a href="https://permiso.io/blog/copilot-prompt-injection-ai-email-phishing?utm_source=radar.thecyberhut.com">The New Phishing Surface Hiding Inside AI Email Summaries</a></p></li><li><p><a href="https://blog.doyensec.com/2026/03/05/mcp-nightmare.html?utm_source=radar.thecyberhut.com">The MCP AuthN/Z Nightmare</a></p></li><li><p><a href="https://github.blog/ai-and-ml/generative-ai/under-the-hood-security-architecture-of-github-agentic-workflows/?utm_source=radar.thecyberhut.com">Under the hood: Security architecture of GitHub Agentic Workflows</a></p></li><li><p>Recorded Future: <a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog?utm_source=radar.thecyberhut.com">2025 Identity Threat Landscape Report</a></p><p style="text-align: center;"></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest On Demand Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><p style="text-align: center;"><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p><p style="text-align: center;"><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p><p style="text-align: center;"><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Downloadable Cheat Sheets</h2><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: center;">Latest Identity Security Vendor Reports</h2><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for SSH</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for SSH services</p><div id="youtube2-Ulm_4atZiIk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ulm_4atZiIk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ulm_4atZiIk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E70 The Analyst Brief: The Rise of AI Browsers. A Game changer for B2C IAM?</p><div id="youtube2-3YFKMLq_qJs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3YFKMLq_qJs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3YFKMLq_qJs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;"><strong>A Fireside Chat with Identity at the Center Podcast</strong></h3><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight by The Cyber Hut</h3><p style="text-align: center;"><a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">The Unified Identity Imperative: Breaking the Cycle of Fragmentation</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p style="text-align: center;"> <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p><p style="text-align: center;"><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p><p style="text-align: center;"><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><p style="text-align: center;">Interviews with <a href="https://www.stackbob.ai/">Stackbob</a>, <a href="https://www.reva.ai/">Reva</a>.ai and <a href="https://www.scalekit.com/">Scalekit</a></p><div id="youtube2-JhvLJFJK7V4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JhvLJFJK7V4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JhvLJFJK7V4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-pgUMhgIcNRE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pgUMhgIcNRE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pgUMhgIcNRE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>What is Teleport&#8217;s Agentic Security Framework?</strong></h3><div id="youtube2-AHIUFtGOWvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AHIUFtGOWvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AHIUFtGOWvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Do Agents Need A Cryptographic Identity?]]></title><description><![CDATA[As AI agents become more autonomous and deeply embedded in modern systems, they&#8217;re no longer just tools&#8212;they&#8217;re active participants.]]></description><link>https://radar.thecyberhut.com/p/do-agents-need-a-cryptographic-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/do-agents-need-a-cryptographic-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 17 Mar 2026 11:17:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9IVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As AI agents become more autonomous and deeply embedded in modern systems, they&#8217;re no longer just tools&#8212;they&#8217;re active participants. They access data, trigger workflows, and interact across platforms with minimal human intervention. Yet despite this growing responsibility, most AI agents still rely on outdated authentication methods never designed for non-human actors.</p><p>This mismatch is becoming a serious security and governance problem.</p><h4>The Identity Gap</h4><p>Today, many AI agents authenticate using hardcoded API keys or long-lived credentials. These approaches are fragile: secrets get leaked, permissions sprawl out of control, and there&#8217;s often no clear way to trace actions back to a specific agent&#8212;or its owner. As the number of agents scales, so does the risk.</p><p>Traditional identity systems assume relatively static users and predictable access patterns. AI agents break both assumptions. They operate continuously, move across environments, and can generate thousands of interactions in minutes. In some cases, they may even expose their own credentials through logs or outputs.</p><h4>A Better Model: Identity-First AI</h4><p>To secure this new class of actors, AI agents need something fundamentally different: a verifiable, dynamic digital identity.</p><p>Instead of relying on shared secrets, agents should authenticate using cryptographic methods&#8212;proving who they are without exposing sensitive credentials. Access should be granted through short-lived, just-in-time tokens that expire quickly, reducing the blast radius of any compromise.</p><p>This approach aligns with zero-trust principles: never assume trust, always verify identity.</p><h4>Centralizing Trust</h4><p>A key part of this model is a centralized identity provider (IdP) that manages authentication and authorization for all agents. This creates a single control plane where policies can be enforced consistently, regardless of where the agent operates.</p><p>With this structure in place, organizations gain something they&#8217;ve long lacked: <strong>true visibility and accountability</strong>. Every action taken by an agent can be tied back to a unique identity&#8212;and, ultimately, to the human or system that deployed it.</p><h4>Why It Matters Now</h4><p>As AI adoption accelerates, the number of non-human identities is set to explode. Without a robust identity framework, organizations risk building powerful systems on top of weak security foundations.</p><div><hr></div><p>These topics are covered in more detail in an analyst comment written for <a href="https://www.akeyless.io/">AKeyless</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9IVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9IVe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 424w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 848w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1272w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" width="768" height="401" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd637576-0800-4171-90a4-adb6182b86ec_768x401.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:401,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:17869,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/avif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191239024?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9IVe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 424w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 848w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1272w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.akeyless.io/blog/giving-ai-agents-a-digital-identity/?utm_source=thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.akeyless.io/blog/giving-ai-agents-a-digital-identity/?utm_source=thecyberhut.com"><span>Read More</span></a></p><div><hr></div><p></p><p><strong>About the Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8211; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p>]]></content:encoded></item><item><title><![CDATA[Industry Webinar: Closing the AD Privileged Access Gap]]></title><description><![CDATA[The Changing Face of PAM]]></description><link>https://radar.thecyberhut.com/p/industry-webinar-closing-the-ad-privileged</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/industry-webinar-closing-the-ad-privileged</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 12 Mar 2026 11:26:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uSLi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Changing Face of PAM</h2><p>Privileged access management (PAM) has undergone a tremendous evolution in the past 5 years. No longer are we focused solely on a subset of systems - that only reside within an on-premises environment. Organisations have to contend with a broader array of identities, high risk systems and deployment models that span on-prem, private cloud, infrastructure, containers and SaaS environments.</p><p>The breadth and depth of identity types has increased too - from server root accounts, to workloads, service accounts and more latterly specific instances of non-human identities (NHI) along with agentic-AI too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TkSK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TkSK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:480555,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TkSK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That initial PAM deployment model - using credential rotation and checkout services alongside basic vaulting - only really supported a subset of the critical high risk systems under management. As the number of variety of systems and services under management increased, the approach to privilege evolved too. </p><div><hr></div><h2>Is AD the PAM Weak Link?</h2><p>If we pick on Active Directory (AD) for a second, has it become the weak link in the privileged access battle? AD was not built for security. In 2000 the basic security design pattern was built upon private/public network boundaries - coarse grained trust areas that focused on location and IP address. Fast forward to 2026 and organisations design via a zero trust approach - often with the assumption that &#8220;controlled&#8221; network components and applications are really open to internet access and likely be &#8220;breached&#8221; already by unauthorised users. </p><p>Whilst AD is not solely a PAM platform, it does contain high risk identities, along with being a jump off point for service accounts, administration functions and a broad array of infrastructure support and configuration functions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NWMr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NWMr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:828969,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NWMr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Remote access approaches such as VPNs, RDP, MS Terminal Services and RADIUS may well leverage AD as a repository, before vectoring off into an array of on-prem and cloud-integrated relying parties, applications and federated services. But has AD kept up with the variety and complexity of identity related attacks that target both standard and high risk accounts?</p><p>Being at the centre of enterprise identity, it can become a fulcrum for cross-identity, privilege-abuse related flows for both internal and external adversarial activity.</p><div><hr></div><h2>What Does Modern PAM Look Like?</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oTjI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oTjI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:894496,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oTjI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>PAM is a journey - an evolution - that many organisations are embarking on. We are starting to see PAM require a broader set of integrated identities and systems, but also from an AD point of view, identify a more flexible and just in time approach that covers service accounts and high risk events.</p><p>A consistent approach to high-risk access across AD and related systems is needed - that allows organisations to &#8220;scale-up&#8221; their security strategy to include NHI, agentic-AI and hybrid deployment model.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uSLi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uSLi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f681024-148b-4074-8ff4-bc742e01010b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uSLi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Cyber Hut&#8217;s next industry webinar will be tackling this topic in more detail. The Cyber Hut founder Simon Moffatt will be in conversation with EMEA Chief Identity Security Advisor Rob Ainscough from <a href="https://www.silverfort.com/">Silverfort</a> on March 16th.</p><p>They&#8217;ll explore:</p><ol><li><p>Why traditional PAM models break down in modern, identity-driven environments</p></li><li><p>How runtime, identity-aware enforcement changes the privileged access security model</p></li><li><p>How organizations can expand privileged access coverage to meet protection goals - without slowing the business down</p></li><li><p>How to mitigate the risk of static human and non-human credentials, and move to Zero Standing Privilege</p></li><li><p>How to mature from protecting accounts, to blast radius controls &amp; containing risk</p></li></ol><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Reserve Your Seat</span></a></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Market Guide to Securing the Production Stack]]></title><description><![CDATA[A research report for understanding the modern privileged access management space]]></description><link>https://radar.thecyberhut.com/p/market-guide-to-securing-the-production</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/market-guide-to-securing-the-production</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 06 Mar 2026 16:10:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SYUk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd42be42a-6765-4b68-ac2f-b8d675fb426d_863x976.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Executive Summary</h2><p>Modern production infrastructure has outpaced traditional Privileged Access Management (PAM), leading to an increase in the identity attack surface along with significant operational drag. </p><p>Traditional, on-premises, vault-centric PAM systems, which were designed for a small, static set of accounts, can no longer manage the breadth of modern systems, protocols, and identity types, including human, non-human, and agentic identities. </p><p>This complexity results in over-provisioned, standing privileges and slow, manual access workflows that frustrate developers and increase risk. This guide outlines a strategic shift from legacy, isolated PAM to an Identity-Native, API-first model that supports a decoupled, &#8220;zero-touch&#8221; production access environment.</p><p>Capabilities in this modern approach leverage:</p><ul><li><p><strong>Just-in-Time (JIT) access and Zero Standing Privilege (ZSP):</strong> JIT allows identities to request access only when needed, and only for as long as needed, which is critical for minimizing the identity attack surface and enforcing a least-privilege policy. (See our Academy <a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">episode</a> for an explainer on JiT and ZSP)</p></li><li><p><strong>Broad, consistent coverage:</strong> A modern privileged access platform must cover the full spectrum of high-risk assets, including cloud consoles, databases, Kubernetes and code repositories, and all identity types, particularly non-human identities (NHIs) which often hold unchecked privileged access.</p></li></ul>
      <p>
          <a href="https://radar.thecyberhut.com/p/market-guide-to-securing-the-production">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Okta and Crowdstrike Earnings Update, Veza+ServiceNpw for Agent Identity, Ping and PAM Plan]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/okta-and-crowdstrike-earnings-update</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/okta-and-crowdstrike-earnings-update</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 05 Mar 2026 12:05:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 style="text-align: center;">Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Curated Industry Announcements</h3><ul><li><p><a href="https://www.cerbos.dev/blog/overcoming-iam-blind-spots-and-fragmentation-for-continuous-governance">Cerbos: Overcoming IAM blind spots and fragmentation for continuous governance</a></p></li><li><p><a href="https://www.fool.com/earnings/call-transcripts/2026/03/03/crowdstrike-crwd-q4-2026-earnings-transcript/">CrowdStrike (CRWD) Q4 2026 Earnings Transcript</a></p></li><li><p><a href="https://www.fool.com/earnings/call-transcripts/2026/03/04/okta-okta-q4-2026-earnings-call-transcript/">Okta (OKTA) Q4 2026 Earnings Call Transcript</a></p></li><li><p><a href="https://www.pingidentity.com/en/resources/blog/post/pingone-privilege-delivers-just-in-time-zero-standing-access.html?utm_source=radar.thecyberhut.com">Ping Identity: Privileged Access Is Broken&#8230;</a></p></li><li><p><a href="https://www.secureauth.com/resources/the-hidden-attack-surface-why-your-identity-vendor-is-your-biggest-security-risk/?utm_source=radar.thecyberhut.com">SecureAuth: Why Your Identity Vendor Is Your Biggest Security Risk</a></p></li><li><p><a href="https://veza.com/blog/veza-servicenow-the-enterprise-agent-identity-control-plane/?utm_source=radar.thecyberhut.com">Veza + ServiceNow: The Enterprise Agent Identity Control Plane</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p><a href="https://www.invictus-ir.com/news/entra-oauth-risk-consent-epidemic?utm_source=radar.thecyberhut.com">The Silent SaaS Threat</a></p></li><li><p><a href="https://www.offensai.com/blog/eventual-consistency-resistant-iam-containment-aws-incident-response?utm_source=radar.thecyberhut.com">AWS Incident Response: IAM Containment That Survives Eventual Consistency</a></p></li><li><p><a href="https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules?utm_source=radar.thecyberhut.com">Google API Keys Weren&#8217;t Secrets. But then Gemini Changed the Rules</a></p></li><li><p><a href="https://www.proofpoint.com/us/blog/threat-insight/disruption-targets-tycoon-2fa-popular-aitm-phaas?utm_source=radar.thecyberhut.com">Disruption targets Tycoon 2FA, popular AiTM PhaaS</a></p></li><li><p><a href="https://redcanary.com/blog/threat-detection/google-workspace-oauth-attack/?utm_source=radar.thecyberhut.com">Breaking down a supply chain attack via a malicious Google Workspace OAuth app</a></p></li><li><p><a href="https://thehackernews.com/2026/02/identity-cyber-scores-new-metric.html">Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026</a></p><p style="text-align: center;"></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ghww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ghww!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 424w, https://substackcdn.com/image/fetch/$s_!ghww!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 848w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1272w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png" width="590" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:590,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:338308,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ghww!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 424w, https://substackcdn.com/image/fetch/$s_!ghww!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 848w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1272w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://info.orchid.security/iam-at-2035?utm_source=thecyberhut.com">Orchid Security Community Event</a> - London - March 12</p><p style="text-align: center;"><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p><p style="text-align: center;"><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p><p style="text-align: center;"><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Downloadable Cheat Sheets</h2><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: center;">Latest Identity Security Vendor Reports</h2><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for CSP</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for cloud service provider components such as S3 storage buckets</p><div id="youtube2-3BSI0gRu1GQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3BSI0gRu1GQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3BSI0gRu1GQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E69 The Analyst Brief: The Rise of IAM Resilience and Why Semperis is buying MightyID</p><div id="youtube2-1Nr4QTrB26A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1Nr4QTrB26A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1Nr4QTrB26A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;"><strong>A Fireside Chat with Identity at the Center Podcast</strong></h3><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight</h3><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p style="text-align: center;"> <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p><p style="text-align: center;"><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p><p style="text-align: center;"><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes</strong></h3><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><p style="text-align: center;">Interviews with <a href="https://www.reva.ai/">Reva</a>.ai and <a href="https://www.scalekit.com/">Scalekit</a></p><div id="youtube2-pgUMhgIcNRE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pgUMhgIcNRE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pgUMhgIcNRE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Video Shorts: Podcast and Interview Highlights</strong></h3><div id="youtube2-_eav1LGJRgM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;_eav1LGJRgM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/_eav1LGJRgM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-QMi4_JM8DSs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;QMi4_JM8DSs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/QMi4_JM8DSs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-Xk4w35ar1_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Xk4w35ar1_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Xk4w35ar1_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-ae-qa4YBYbo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ae-qa4YBYbo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ae-qa4YBYbo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-p8nYyvRmHb4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;p8nYyvRmHb4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/p8nYyvRmHb4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[The Rise of Autonomous Ticket Resolution]]></title><description><![CDATA[Why AI Digital Employees Can Improve IAM]]></description><link>https://radar.thecyberhut.com/p/the-rise-of-autonomous-ticket-resolution</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/the-rise-of-autonomous-ticket-resolution</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Mon, 02 Mar 2026 10:13:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YXHb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>IAM Ticket Resolution Today: Oversubscribed and Ineffective</h2><ul><li><p>Broad variety of ticket types</p></li><li><p>Lack of fulfilment efficiency</p></li></ul><p>Service desk ticketing systems today are routinely overworked and ineffective when it comes to identity and access management (IAM) - and for several core reasons. The volume and variety of identity types and systems has increased - but so have the volume and variety of tickets being raised.</p><p>Broad and disjointed multi-factor authentication (MFA) strategies typically correlate with an increase in enrolment issues, as well as the avoidable troubles associated with credential and password reset work flows.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YXHb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YXHb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 424w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 848w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1272w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" width="847" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:847,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:290582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189631482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YXHb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 424w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 848w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1272w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>New user on-boarding inevitably generates interactions with respect to device configuration and a lack of familiarity with technology or systems registration. But ultimately it is in the access management and misalignment domain that are generating the most interactions - many of which are becoming complex to complete and fulfil.</p><p>Many of these requests are repeatable, routine and avoidable - yet are still being completed by human operators. Requests often lack the appropriate level of context and detail - missing basic details such as the user&#8217;s current role or access, a system owner or a more risk-aligned description of what is needed and why.<br></p><p>Fulfilment times are increasing too as a result. The breadth and depth of request coverage likely means that many downstream systems are disconnected from the core automated provisioning apparatus - resulting in error prone and customised fulfilment of access additions or removals. A lack of context can also impair risk based decision making as it comes to changing access that is in alignment with both business requirements and security controls.</p><div><hr></div><h2>Risk Increasing &amp; Productivity Decreasing</h2><ul><li><p>Lack of consistency</p></li><li><p>Human error and complex operating procedures</p></li></ul><p>The impact of this is not just overworked employees and inefficient service desk fulfilment. As the strategic role of IAM has increased to enable productivity, security and revenue generation opportunities, the ineffectiveness of ticket management creates systemic failures in many parts of the modern business.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mqnd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mqnd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 424w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 848w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1272w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png" width="675" height="713" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee354cba-64ad-446c-b513-03bb71f21053_675x713.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:713,&quot;width&quot;:675,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239882,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189631482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mqnd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 424w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 848w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1272w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Delays in access fulfilment have a material impact on risk management. A slowdown in access removal - be it for a terminated employee, insider threat scenario or task completion - introduces significant issues with respect to privilege escalation opportunities or privilege abuse. In addition to delay, a lack of context, disconnected systems and human-centric process results in inconsistent completion and a lack of repeatable execution. This has a cascading effect on both productivity and risk.</p><p>Productivity also needs to be considered from both a fulfilment and end user point of view. A lack of context, repeatability and manual completion results in reduced effort to closure rates, but delays and inconsistencies in closure impact the end user too. Ticket bounce backs - often due to incorrectly assigned permissions or the removal of the wrong permissions - prevent task completion or result in timely escalations with no clear incident resolution pathway.</p><div><hr></div><h2>Rise of The AI Digital Employee: Automation, Consistency, Repeatability</h2><ul><li><p>Specialised learning based on company and context</p></li><li><p>Human augmentation</p></li></ul><p>So what can be done? Vendors like <a href="https://www.twinesecurity.com/">Twine Security</a> are certain that the rise of the AI digital employee is showing significant inroads in solving some of these key issues. An ability to train an agent with the specific nuances of an organisation, system and their joiner-mover-leaver processes is now quite possible. AI thrives on data - and the data relating to how an organisation manages their identity and access management processes is often readily available. This form of specialist learning is critical.</p><blockquote><p><a href="https://www.twinesecurity.com/">Twine Security</a> describe themselves as: <em>&#8220;Reduce manual cybersecurity work by 70% with Twine's AI Digital Employees.  Automate identity management, cut costs, and improve team efficiency.&#8221;</em></p></blockquote><p>Not all organisations are the same. Not all on-boarding and off-boarding processes are the same. Access request approvals will vary, the connected systems will vary and how they are connected will also vary. And as technology never lives in a vacuum, all of these components are constantly in a state of flux - which many traditional IAM systems fail to handle - often designed from a very static point of view. Each of these components and workflows will also see execution variability based on a combination of end user involved in the request, the approver and the context too. AI of course is designed to consume both vast amounts of data but also the nuances within it - allowing optimisation to take place.</p><p>A key part of deploying not just digital employees but agentic-AI in general, is building trust. Trust from an interaction point of view but also from an operational perspective. Evidence of hallucination and negative optimisation are now common, so it becomes critical to leverage a digital employee function that knows its own limitations. Knows when risk is present, a lack of information is present and knows when an optimal outcome can not be achieved without human guidance. It is important the agentic-approach not only knows when to escalate, but how to escalate.</p><div><hr></div><h2>Full Accountability, With Strategic Automation</h2><ul><li><p>Smarter decision making</p></li><li><p>Operational improvement</p></li><li><p>Security and audit traceability</p></li></ul><p>There are touch-points where guardrails are critical. Initial on-boarding with respect to agent credential configuration, permissioning and credential issuance should be deterministic and transparent. This on-boarding process is critical to understand the existing nuance of both manual and automated processes - why have they been created, what might go wrong and who from an approval and escalation process is needed to complete both the happy and unhappy paths.</p><p>That learning process should also contribute to the identification of data concerns, or inefficiencies with respect to process or execution. By analysing existing processes and the ticket instances that have previously been completed, digital employees should be able to understand patterns and capture the subtle context needed (or lacking) to accelerate completion.</p><p>The immediate metric of success is operational improvement. Tickets can be fulfilled faster, with more automation and more consistency, but can also be optimised. Redundant stages, poorly completed or missing form entries can all be removed.</p><p>The key to both adoption and continual improvement is the ability to have full traceability of all of the AI digital employee events and ticket fulfilment stages. Audit and monitoring of all individual events and tasks is a given, but also the linkage back to a carbon life-form. This essentially is supporting the &#8220;on-behalf&#8221; of authorization flow for agentic-AI where it is critical to understand why and how an employee was triggered and is it authorised.</p><p>IAM is complex. Organisations have to deal with a range of asymmetric information problems, disconnected systems, missing workflows and an increasing rise in the volume and variety of identities and systems under management. The rise of Agentic AI adoption across all parts of the technology landscape is delivering huge productivity gains and competitive opportunities. The specific focus on the often stagnant IAM fulfilment flows will reduce considerable effort and security risk that many organisations are now facing.</p><div><hr></div><p>An interview with Twine Security for The Cyber Hut&#8217;s vendor introduction series:</p><div id="youtube2-voMfdd4ldZ4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;voMfdd4ldZ4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/voMfdd4ldZ4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p><strong>About The Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> - a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[IGA Success Metrics Template]]></title><description><![CDATA[How to measure modern identity governance and administration platforms]]></description><link>https://radar.thecyberhut.com/p/iga-success-metrics-template</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/iga-success-metrics-template</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 27 Feb 2026 16:51:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4acf14ef-0c79-4fcb-be2e-3eb454d1b828_779x721.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>1. Security and Risk Reduction Metrics</h2><p>The primary goal of a modern identity governance and administration (IGA) solution is to enforce concepts like the <strong>Principle of Least Privilege</strong> and actively reduce the identity attack surface, as emphasized in the transition to <strong>Zero Standing Privilege (ZSP)</strong> and the focus on <strong>Identity Security Posture Management (ISPM)</strong>.</p><ul><li><p><strong>Access Risk Reduction:</strong> Target a reduction in users with unneeded or excessive access (Orphaned Accounts, Stale Access).</p></li><li><p><strong>Segregation of Duties (SoD) Violations:</strong> Decrease in total SoD policy violations by a measurable percentage within a finite timeframe (e.g. within 6 months).</p></li><li><p><strong>Time-to-Remediation:</strong> Decrease the time required to revoke access for high-risk or compromised identities.</p></li></ul>
      <p>
          <a href="https://radar.thecyberhut.com/p/iga-success-metrics-template">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Apono Agentic Report, Auth0 B2C Revenue Analysis, SentinelOne IAM Offering, P0 AuthZ Plane for AI]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/apono-agentic-report-auth0-b2c-revenue</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/apono-agentic-report-auth0-b2c-revenue</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 26 Feb 2026 10:35:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/1Nr4QTrB26A" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h3>Curated Industry Announcements</h3><ul><li><p><strong>Apono</strong>: <a href="https://www.prnewswire.com/news-releases/new-apono-report-reveals-98-of-cybersecurity-leaders-are-slowing-agentic-ai-adoption-due-to-insufficient-security-controls-302696914.html">New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls</a></p></li><li><p><strong>Auth0</strong>: <a href="https://auth0.com/blog/revenue-potential-shared-accounts-fga/?utm_source=radar.thecyberhut.com">The Revenue Potential of Shared Accounts With Fine-Grained Authorization (FGA)</a></p></li><li><p><strong>CrowdStrike</strong>: <a href="https://www.crowdstrike.com/en-us/blog/exposing-insider-threats-through-data-protection-identity-hr-context/?utm_source=radar.thecyberhut.com">Exposing Insider Threats through Data Protection, Identity, and HR Context</a></p></li><li><p><strong>Gathid</strong>: <a href="https://gathid.com/news/the-silent-breach-how-organizational-drift-becomes-an-identity-threat/?utm_source=radar.thecyberhut.com">The Silent Breach: How Organizational Drift Becomes An Identity Threat</a></p></li><li><p><strong>LoginRadius</strong>: <a href="https://www.loginradius.com/blog/engineering/what-is-mcp-authorization">MCP Authorization: The Key to Safe and Simple AI Integrations</a></p></li><li><p><strong>P0 Security</strong>: <a href="https://www.p0.dev/pr/authz-control-plane-nhis-ai-agents?utm_source=radar.thecyberhut.com">P0 Security extends its Authz Control Plane to service accounts, workloads and AI agents</a></p></li><li><p><strong>Ping Identity</strong>: <a href="https://www.pingidentity.com/en/resources/blog/post/iron-bank-containers-strengthen-dow-data-security.html?utm_source=radar.thecyberhut.com">Ping Identity&#8217;s Secure Containers in Iron Bank Strengthen DOW Data Security</a></p></li><li><p><strong>Saviynt</strong>: <a href="https://saviynt.com/press-release/amazon-q-ai-identity-security-integration?utm_source=radar.thecyberhut.com">Saviynt bolsters Its AI-powered Identity Security through integrations with Amazon Quick</a></p></li><li><p><strong>SentinelOne</strong>: <a href="https://www.sentinelone.com/press/sentinelone-unveils-new-identity-portfolio-and-strategy/?utm_source=radar.thecyberhut.com">SentinelOne Unveils New Identity Portfolio and Strategy for Securing Human and Non-Human Identities</a></p></li><li><p><strong>Segura</strong>: <a href="https://segura.security/post/riverwood-capital-investment/?utm_source=radar.thecyberhut.com">Announces $25M Growth Round from Riverwood Capital to Strengthen Identity Security Platform</a></p></li><li><p><strong>Teleport</strong>: <a href="https://goteleport.com/blog/how-to-secure-microservices-spiffe-istio/?utm_source=radar.thecyberhut.com">From Zero Trust to SPIFFE: How to Secure Microservices with Istio and Teleport</a></p></li><li><p><strong>Veza</strong>:<strong> </strong><a href="https://veza.com/blog/veza-the-enterprise-agent-identity-control-plane/?utm_source=radar.thecyberhut.com">The Enterprise Agent Identity Control Plane</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://semgrep.dev/blog/2026/openclaw-security-engineers-cheat-sheet/?utm_source=radar.thecyberhut.com">OpenClaw Security Engineer&#8217;s Cheat Sheet</a></p></li><li><p><a href="https://www.wiz.io/blog/detecting-malicious-oauth-applications?utm_source=radar.thecyberhut.com">Would You Click &#8216;Accept&#8217;? Automatically detecting malicious Azure OAuth applications using LLMs</a></p></li><li><p><a href="https://cloudsecurityalliance.org/blog/2026/02/20/openclaw-threat-model-maestro-framework-analysis">OpenClaw Threat Model: MAESTRO Framework Analysis</a></p></li><li><p><a href="https://socradar.io/blog/make-digital-asset-inventory/?utm_source=radar.thecyberhut.com">How to Make a Digital Asset Inventory?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Identity Security Vendor Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li></ul><div><hr></div><h2>Recent Content Updates</h2><h2><strong>A Demo Discussion on JiT for CSP</strong></h2><ul><li><p>A demo walk through by P0 Security taking a look at just in time access for cloud service provider components such as S3 storage buckets</p></li></ul><div id="youtube2-3BSI0gRu1GQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3BSI0gRu1GQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3BSI0gRu1GQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>Our Recent Podcast Episodes</h3><ul><li><p>E69 The Analyst Brief: The Rise of IAM Resilience and Why Semperis is buying MightyID&#8230;</p><p></p><div id="youtube2-1Nr4QTrB26A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1Nr4QTrB26A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1Nr4QTrB26A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Our Recent Research Reports:</strong></h3><ul><li><p><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>Our Recent Comments and Analyst Insight</strong></h3><ul><li><p>A fireside chat with the Identity at the Center podcast on Identity Security:</p></li></ul><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>The Identity Underground 2026 Pulse: <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Our Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Our Recent Training Academy Episodes</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Our Recent Deep Dive Vendor Assessment Reports</strong></h3><p>As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3><strong>Our Recent Vendor Introduction Interviews</strong></h3><p>What is the new auth-stack? We sat down with <a href="https://www.scalekit.com/">Scalekit</a> to find out more&#8230;</p><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Our Recent Video Shorts</strong></h3><div id="youtube2-Xk4w35ar1_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Xk4w35ar1_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Xk4w35ar1_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-ae-qa4YBYbo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ae-qa4YBYbo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ae-qa4YBYbo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-p8nYyvRmHb4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;p8nYyvRmHb4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/p8nYyvRmHb4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cheat Sheet: Agentic-AI Security Architecture Example]]></title><description><![CDATA[A working document to broaden awareness of a holistic AI security pattern]]></description><link>https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 17 Feb 2026 12:46:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eanl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 424w, https://substackcdn.com/image/fetch/$s_!eanl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 848w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1272w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" width="818" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:818,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:563813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188254238?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eanl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 424w, https://substackcdn.com/image/fetch/$s_!eanl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 848w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1272w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Agent Identity and Access Management</strong></h2><p>We need to verify the agent's identity via attestation, before issuing bound credentials and unique attributes. We need to be dynamically granting access to data, apps, and other agents. All wrapped in ephemeral and just-in-time concepts.</p><p><strong>Considerations:</strong> </p><ul><li><p>Secret-zero issue - how to attest processes or requesting party before credentials are minted, issued and bound</p></li><li><p>How to identify what permissions an agent needs?</p></li><li><p>How to verify a human has access to an agent?</p></li><li><p>Should the agent &#8220;claim&#8221; permissions from the requesting party?</p></li><li><p>How to handle agent to agent combined permissions risk and union of access?</p></li><li><p>How to handle MFA requirements? Is a possession factor enough?</p></li><li><p>Should credentials be auto-rotated, or rotated only during high risk?</p></li></ul><div><hr></div><h2><strong>Data and Knowledge Protection</strong></h2><p>Policies are needed to prevent unauthorized use of critical data by AI agents, ensuring access permissions are based on the type of data or resource being accessed - so this is a combination of PEP and also data confidentiality protection measures. </p><p><strong>Considerations:</strong></p><ul><li><p>Can existing DLP and DSPM products support the necessary discovery, classification and risk tagging of data resources?</p></li><li><p>Can data objects be protected at rest, in transit and in use?</p></li><li><p>Are concepts like homomorphic encryption and multi-party computing, understood, applicable?</p></li><li><p>Are integrity protection mechanisms necessary?</p></li><li><p>Are content authenticity measures in place? Are they scaleable? Can they be verified offline and at scale?</p></li><li><p>How is the data returned back from an agent protected?</p></li></ul><div><hr></div><h2><strong>Agent Operational Integrity and Resilience</strong> </h2><p>We need to ensure the agent's behavioral integrity is upheld by detecting and preventing tampering, drifting off-task, or malicious manipulation. This is tricky as some behaviour changes are expected for optimization and learning.</p><p><strong>Considerations:</strong></p><ul><li><p>What does success look like for an agent?</p></li><li><p>Can that success be articulated during creation?</p></li><li><p>Can agents be compared to each other?</p></li><li><p>Can and should agent behaviour be compared and tied to a human-requestor&#8217;s behaviour?</p></li><li><p>Are historical behaviour patterns for agents useful?</p></li><li><p>Agents are likely to be targets - how can they be protected?</p></li><li><p>Can they be stolen, replicated, impersonated?</p></li></ul><div><hr></div><h2><strong>Agentic Governance, Risk and Compliance (GRC)</strong></h2><p>We need to establish guidelines for agent behavior, risk changes, and ensuring that the agent's actions are auditable and traceable. Everything needs to be in sync for regulatory adherence.</p><p><strong>Considerations:</strong></p><ul><li><p>End to end traceability is important - that links agent tasks to human tasks</p></li><li><p>Can agent actions be reversed?</p></li><li><p>At what point do agent events need approval?</p></li><li><p>What is the process for agent creation?</p></li><li><p>What level of explainability is available?</p></li><li><p>What level of agent action transparency is available?</p></li></ul><div><hr></div><h2><strong>Policy Engine with Runtime Enforcement</strong></h2><p>A system that provides granular, adaptive access control that changes dynamically based on real-time context and assessed risk levels. It enforces policies for access to corporate systems, inter-agent sharing, access periods (JIT), and memory retention. Can today&#8217;s human-centric PBAC systems do this?</p><p><strong>Considerations:</strong></p><ul><li><p>How are policies created?</p></li><li><p>How are policies stored and made available to enforcing systems?</p></li><li><p>Are policies part of the governance model?</p></li><li><p>How are policies changed and analysed for effectiveness?</p></li><li><p>How should policy be changed post-incident?</p></li><li><p>Can enforcement points scale and be effective away from a central hub?</p></li></ul><div><hr></div><h2><strong>Human Oversight, Accountability, and Attribution</strong></h2><p>We need to ensure that all actions by autonomous agents can be traced back to an originating human user or organizational policy, often utilizing "human-in-the-loop" mechanisms for critical or sensitive actions.</p><p><strong>Considerations:</strong></p><ul><li><p>These are extension points that anchor both policy design and enforcement and how the GRC components are executed</p></li></ul><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><p></p><p></p><p></p><p></p>]]></content:encoded></item></channel></rss>