<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Hut Radar - Emerging Technology Research]]></title><description><![CDATA[Research, reports and analysis on the global Identity Security and Cyber Security industry]]></description><link>https://radar.thecyberhut.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Lq6a!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49adcbd9-faf9-4c5d-b67b-0fb859d3d3f5_300x300.png</url><title>The Cyber Hut Radar - Emerging Technology Research</title><link>https://radar.thecyberhut.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 12:28:21 GMT</lastBuildDate><atom:link href="https://radar.thecyberhut.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Cyber Hut]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecyberhut@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecyberhut@substack.com]]></itunes:email><itunes:name><![CDATA[The Cyber Hut]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Cyber Hut]]></itunes:author><googleplay:owner><![CDATA[thecyberhut@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecyberhut@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Cyber Hut]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Review of RSAC 2026]]></title><description><![CDATA[A retrospective on emerging security trends from the 35th anniversary of the key conference]]></description><link>https://radar.thecyberhut.com/p/review-of-rsac-2026</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/review-of-rsac-2026</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 31 Mar 2026 08:22:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AfHC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F431b3c1e-de2c-4410-81b7-feba09220bec_3264x3264.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week I travelled over to San Francisco for the <a href="https://www.rsaconference.com/library/video/rsac-conference-35th-anniversary">35th edition</a> of the <a href="https://www.rsaconference.com/">RSAC</a> conference. I joined over 40,000 security professionals from around the globe all wondering if AI can be &#8220;secured&#8221; - by what and how. We got <em>some</em> answers to that during week - for which I will return later - but perhaps that wasn&#8217;t necessarily the main question we should have b&#8230;</p>
      <p>
          <a href="https://radar.thecyberhut.com/p/review-of-rsac-2026">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Hidden Risk of Fragmented Identity]]></title><description><![CDATA[And what can be done about it]]></description><link>https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 26 Mar 2026 14:18:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K-kJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff0387e-90a3-4224-8bdf-3c205395c520_1243x873.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As organisations scale across cloud, SaaS, and AI-driven environments, identity has become the <strong>primary control plane for security and access</strong>. Yet most enterprises still operate with a fragmented identity architecture&#8212;multiple tools, disconnected policies, and incomplete visibility.</p><p>This fragmentation is no longer just inefficient&#8212;it is <strong>a fundamental busi&#8230;</strong></p>
      <p>
          <a href="https://radar.thecyberhut.com/p/the-hidden-risk-of-fragmented-identity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Why Isolated User Authentication Undermines Security]]></title><description><![CDATA[And destroys user productivity and happiness]]></description><link>https://radar.thecyberhut.com/p/why-isolated-user-authentication</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/why-isolated-user-authentication</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 24 Mar 2026 14:10:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hKjl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Modern identity systems are often designed with strong authentication technologies - fulti-factor authentication (MFA), biometrics, and passwordless methods in the digital space and possession based in the physical (site and building) domain.</p><p>Yet despite these advances, many organisations still suffer from weak identity assurance. The reason is not a lack of technology, but a failure in <strong>how identity is experienced across the user journey</strong>, that merges the physical and digital realms.</p><div><hr></div><h2>The Problem: Fragmented Access &amp; Authentication</h2><p>Most organisations treat identity as a series of disconnected events:</p><ul><li><p><strong>Enrolment</strong> (initial setup of credentials)</p></li><li><p><strong>Authentication</strong> (logging in)</p></li><li><p><strong>Recovery</strong> (password resets, account unlocks)</p></li></ul><p>In practice, these stages are often handled by <strong>different systems, policies, and processes</strong>. This leads to:</p><ul><li><p>inconsistent user experiences</p></li><li><p>duplicated credentials</p></li><li><p>gaps in assurance between steps</p></li></ul><p>If we then multiple this fragmentation across different systems and different scenarios across the physical and digital realms, we have a cascade of issues.</p><div><hr></div><h2>Why This Matters: Assurance Breaks at the Weakest Point</h2><p>Identity assurance is only as strong as its weakest link. Even if authentication is robust, weaknesses in enrolment or recovery can undermine the entire system.</p><p>For example:</p><ul><li><p>Weak identity proofing during enrolment allows false identities</p></li><li><p>Poor recovery processes enable account takeover</p></li><li><p>Inconsistent policies create exploitable gaps</p></li></ul><p>In a recent analyst comment <a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">article</a> written for <a href="https://www.hidglobal.com/?utm_source=radar.thecyberhut.com&amp;sourceURL=blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance">HID</a> I emphasise that <strong>recovery and reset processes are often the least secure parts of the journey</strong>. If this in turn is amplified by isolated physical and digital integration this problem becomes one of high risk and poor user experience.</p><div><hr></div><h2>What Can Be Done: Shift From Authentication to Journeys</h2><p>The key insight from the article is that identity should not be treated as isolated controls, but as a <strong>continuous, end-to-end journey</strong>.</p><p>This requires a move toward:</p><h2>1. Converged identity</h2><ul><li><p>A unified system across digital and physical access</p></li><li><p>Single identity spanning enrolment, authentication, and recovery</p></li></ul><h2>2. Continuous assurance</h2><ul><li><p>Identity confidence maintained over time, not just at login</p></li><li><p>Contextual signals (device, behaviour, location) informing access</p></li></ul><h2>3. Seamless user experience</h2><ul><li><p>Reduced friction through passwordless or adaptive authentication</p></li><li><p>Consistent processes across all identity interactions</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hKjl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hKjl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 424w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 848w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1272w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png" width="861" height="838" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:838,&quot;width&quot;:861,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:703406,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191577927?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hKjl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 424w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 848w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1272w, https://substackcdn.com/image/fetch/$s_!hKjl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34a368c1-fcf4-4ccb-8c62-e2e809fc5fb7_861x838.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com"><span>Read More</span></a></p><div><hr></div><h3>About The Author</h3><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8212; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">Consumer Identity &amp; Access Management: Design Fundamentals</a> and &#8220;IAM at 2035: A Future Guide to Identity Security&#8221;. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p>]]></content:encoded></item><item><title><![CDATA[Can We Solve The Broken Identity Journey?]]></title><description><![CDATA[Does a converged authentication solution exist?]]></description><link>https://radar.thecyberhut.com/p/can-we-solve-the-broken-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/can-we-solve-the-broken-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 20 Mar 2026 11:37:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EHhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Identity systems are under more pressure than ever. With more users, devices, and  AI-driven identities accessing more systems across a broader array of deployment models. But there&#8217;s a growing problem: the <strong>identity journey is broken</strong>.</p><h4>The Fragmentation Problem</h4><p>In many organisation, authentication is fragmented across multiple systems, tools, and environments. Employees move between physical access (badges, PINs) and digital systems (passwords, MFA, SSO), each with different processes for enrollment, login, and credential reset.</p><p>The result? A disjointed and inconsistent experience that creates what can only be described as <strong>credential chaos</strong>.</p><h4>More Friction, Less Security</h4><p>This fragmentation doesn&#8217;t just frustrate users&#8212;it actively undermines security.</p><p>Users are forced to manage multiple credentials and workflows, leading to frequent resets, workarounds, and mistakes. At the same time, IT teams struggle with rising support costs and operational complexity.</p><p>Critically, organisations lose <strong>end-to-end visibility</strong> of identity. There&#8217;s no reliable way to ensure that the person who entered a building is the same one accessing sensitive systems later.</p><h4>Identity Assurance Breaks Down</h4><p>Identity assurance&#8212;the confidence that someone is truly who they claim to be&#8212;depends on consistency across the entire access journey. But when authentication is siloed and inconsistent, that assurance collapses.</p><p>Security controls become difficult to enforce, measure, and scale. Integration between systems becomes fragile. Costs increase while trust decreases. </p><h4>The Case for Unified Authentication</h4><p>By unifying authentication across physical and digital environments, organizations can create a <strong>single, consistent identity journey</strong>. This results in:</p><ul><li><p>One cohesive authentication experience</p></li><li><p>Centralized visibility and control</p></li><li><p>Stronger, measurable identity assurance</p></li></ul><p>A unified approach not only improves security but also reduces friction and enables future scalability&#8212;especially as non-human identities continue to grow. </p><div><hr></div><p>This is a topic I wrote about in more detail in a recent analyst comment made for <a href="https://www.hidglobal.com/">HID</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EHhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EHhH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 424w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 848w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1272w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png" width="698" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:698,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82712,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191240275?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EHhH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 424w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 848w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1272w, https://substackcdn.com/image/fetch/$s_!EHhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff4e8fb86-2b6f-42eb-8309-0a69765ccfdb_698x684.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com"><span>Read More</span></a></p><div><hr></div><p><strong>About The Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8212; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">Consumer Identity &amp; Access Management: Design Fundamentals</a> and &#8220;IAM at 2035: A Future Guide to Identity Security&#8221;. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Apono Agent Priv Guard, Bravura IAM Insurance Controls, C1 2026 Future IAM Report, Omada new CEO]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/apono-agent-priv-guard-bravura-iam</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/apono-agent-priv-guard-bravura-iam</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 19 Mar 2026 10:25:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 style="text-align: center;">Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Curated Industry Announcements</h3><ul><li><p><strong>Aembit</strong>: <a href="https://aembit.io/blog/spiffe-vs-oauth-access-control-nonhuman-identities/?utm_source=radar.thecyberhut.com">SPIFFE vs. OAuth: Access Control for Nonhuman Identities</a></p></li><li><p><strong>Apono</strong>: <a href="https://www.prnewswire.com/news-releases/apono-launches-agent-privilege-guard-bringing-runtime-privilege-guardrails-to-enterprise-ai-agents-302717422.html">Apono Launches Agent Privilege Guard, Bringing Runtime Privilege Guardrails to Enterprise AI Agents</a></p></li><li><p><strong>AWS</strong>: <a href="https://aws.amazon.com/blogs/security/deploy-aws-applications-and-access-aws-accounts-across-multiple-regions-with-iam-identity-center/">Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center</a></p></li><li><p><strong>Bravura</strong> <strong>Security</strong>: <a href="https://www.bravurasecurity.com/blog/cybersecurity-insurance-compliance?utm_source=radar.thecyberhut.com">What Your Insurer Actually Wants to See in Your Identity Controls</a></p></li><li><p><strong>Cisco</strong>: <a href="https://blogs.cisco.com/security/cisco-access-manager-identity-based-access-control-that-lean-it-teams-can-deploy?utm_source=radar.thecyberhut.com">Cisco Access Manager: Identity-Based Access Control That Lean IT Teams Can Actually Deploy</a></p></li><li><p><strong>ConductorOne</strong>:<a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com"> 2026 Future of Identity Report</a></p></li><li><p><strong>Entro</strong> <strong>Security</strong>: <a href="https://entro.security/how-smart-should-your-secrets-rotation-technology-be/?utm_source=radar.thecyberhut.com">How smart should your secrets rotation technology be?</a></p></li><li><p><strong>Omada</strong>: <a href="https://www.prnewswire.com/news-releases/omada-appoints-jakob-h-kraglund-as-ceo-to-accelerate-global-growth-302716791.html">Omada Appoints Jakob H. Kraglund as CEO to Accelerate Global Growth</a></p></li><li><p><strong>Google</strong> <strong>Cloud</strong>: <a href="https://cloud.google.com/blog/products/serverless/iap-integration-with-cloud-run/">Simplify your Cloud Run security with Identity Aware Proxy (IAP)</a></p></li><li><p><strong>LoginRadius</strong>: <a href="https://www.loginradius.com/blog/engineering/model-context-protocol-mcp-security-risks?utm_source=radar.thecyberhut.com">Model Context Protocol (MCP): Security Risks Explained</a></p></li><li><p><strong>Sailpoint</strong>: <a href="https://www.sailpoint.com/press-releases/sailpoint-launches-shadow-ai-remediation?utm_source=radar.thecyberhut.com">Launches Shadow AI Remediation</a></p></li><li><p><strong>SpyCloud</strong>: <a href="https://spycloud.com/newsroom/annual-identity-exposure-report-2026/?utm_source=radar.thecyberhut.com">SpyCloud&#8217;s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft</a></p></li><li><p><strong>Strata</strong> <strong>Identity</strong>: <a href="https://www.strata.io/blog/continuity/secure-identity-for-tak-atak-at-the-tactical-edge/?utm_source=radar.thecyberhut.com">Secure Identity for TAK/ATAK at the Tactical Edge</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p>CO-PILOT, DISENGAGE AUTOPHISH: <a href="https://permiso.io/blog/copilot-prompt-injection-ai-email-phishing?utm_source=radar.thecyberhut.com">The New Phishing Surface Hiding Inside AI Email Summaries</a></p></li><li><p><a href="https://blog.doyensec.com/2026/03/05/mcp-nightmare.html?utm_source=radar.thecyberhut.com">The MCP AuthN/Z Nightmare</a></p></li><li><p><a href="https://github.blog/ai-and-ml/generative-ai/under-the-hood-security-architecture-of-github-agentic-workflows/?utm_source=radar.thecyberhut.com">Under the hood: Security architecture of GitHub Agentic Workflows</a></p></li><li><p>Recorded Future: <a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog?utm_source=radar.thecyberhut.com">2025 Identity Threat Landscape Report</a></p><p style="text-align: center;"></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Latest On Demand Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><p style="text-align: center;"><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p><p style="text-align: center;"><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p><p style="text-align: center;"><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Downloadable Cheat Sheets</h2><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: center;">Latest Identity Security Vendor Reports</h2><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for SSH</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for SSH services</p><div id="youtube2-Ulm_4atZiIk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ulm_4atZiIk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ulm_4atZiIk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E70 The Analyst Brief: The Rise of AI Browsers. A Game changer for B2C IAM?</p><div id="youtube2-3YFKMLq_qJs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3YFKMLq_qJs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3YFKMLq_qJs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;"><strong>A Fireside Chat with Identity at the Center Podcast</strong></h3><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight by The Cyber Hut</h3><p style="text-align: center;"><a href="https://www.unosecur.com/blog/the-unified-identity-imperative-breaking-the-cycle-of-fragmentation?utm_source=radar.thecyberhut.com">The Unified Identity Imperative: Breaking the Cycle of Fragmentation</a></p><p style="text-align: center;"><a href="https://blog.hidglobal.com/enroll-forget-reset-repeat-how-broken-identity-journeys-undermine-identity-assurance?utm_source=radar.thecyberhut.com">Enroll. Forget. Reset. Repeat: How Broken Identity Journeys Undermine Identity Assurance</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p style="text-align: center;"> <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p><p style="text-align: center;"><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p><p style="text-align: center;"><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes by The Cyber Hut</strong></h3><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><p style="text-align: center;">Interviews with <a href="https://www.stackbob.ai/">Stackbob</a>, <a href="https://www.reva.ai/">Reva</a>.ai and <a href="https://www.scalekit.com/">Scalekit</a></p><div id="youtube2-JhvLJFJK7V4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;JhvLJFJK7V4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/JhvLJFJK7V4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-pgUMhgIcNRE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pgUMhgIcNRE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pgUMhgIcNRE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>What is Teleport&#8217;s Agentic Security Framework?</strong></h3><div id="youtube2-AHIUFtGOWvY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AHIUFtGOWvY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AHIUFtGOWvY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Do Agents Need A Cryptographic Identity?]]></title><description><![CDATA[As AI agents become more autonomous and deeply embedded in modern systems, they&#8217;re no longer just tools&#8212;they&#8217;re active participants.]]></description><link>https://radar.thecyberhut.com/p/do-agents-need-a-cryptographic-identity</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/do-agents-need-a-cryptographic-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 17 Mar 2026 11:17:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9IVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As AI agents become more autonomous and deeply embedded in modern systems, they&#8217;re no longer just tools&#8212;they&#8217;re active participants. They access data, trigger workflows, and interact across platforms with minimal human intervention. Yet despite this growing responsibility, most AI agents still rely on outdated authentication methods never designed for non-human actors.</p><p>This mismatch is becoming a serious security and governance problem.</p><h4>The Identity Gap</h4><p>Today, many AI agents authenticate using hardcoded API keys or long-lived credentials. These approaches are fragile: secrets get leaked, permissions sprawl out of control, and there&#8217;s often no clear way to trace actions back to a specific agent&#8212;or its owner. As the number of agents scales, so does the risk.</p><p>Traditional identity systems assume relatively static users and predictable access patterns. AI agents break both assumptions. They operate continuously, move across environments, and can generate thousands of interactions in minutes. In some cases, they may even expose their own credentials through logs or outputs.</p><h4>A Better Model: Identity-First AI</h4><p>To secure this new class of actors, AI agents need something fundamentally different: a verifiable, dynamic digital identity.</p><p>Instead of relying on shared secrets, agents should authenticate using cryptographic methods&#8212;proving who they are without exposing sensitive credentials. Access should be granted through short-lived, just-in-time tokens that expire quickly, reducing the blast radius of any compromise.</p><p>This approach aligns with zero-trust principles: never assume trust, always verify identity.</p><h4>Centralizing Trust</h4><p>A key part of this model is a centralized identity provider (IdP) that manages authentication and authorization for all agents. This creates a single control plane where policies can be enforced consistently, regardless of where the agent operates.</p><p>With this structure in place, organizations gain something they&#8217;ve long lacked: <strong>true visibility and accountability</strong>. Every action taken by an agent can be tied back to a unique identity&#8212;and, ultimately, to the human or system that deployed it.</p><h4>Why It Matters Now</h4><p>As AI adoption accelerates, the number of non-human identities is set to explode. Without a robust identity framework, organizations risk building powerful systems on top of weak security foundations.</p><div><hr></div><p>These topics are covered in more detail in an analyst comment written for <a href="https://www.akeyless.io/">AKeyless</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9IVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9IVe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 424w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 848w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1272w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif" width="768" height="401" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd637576-0800-4171-90a4-adb6182b86ec_768x401.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:401,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:17869,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/avif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/191239024?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9IVe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 424w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 848w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1272w, https://substackcdn.com/image/fetch/$s_!9IVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd637576-0800-4171-90a4-adb6182b86ec_768x401.avif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.akeyless.io/blog/giving-ai-agents-a-digital-identity/?utm_source=thecyberhut.com&quot;,&quot;text&quot;:&quot;Read More&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.akeyless.io/blog/giving-ai-agents-a-digital-identity/?utm_source=thecyberhut.com"><span>Read More</span></a></p><div><hr></div><p></p><p><strong>About the Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> &#8211; a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p>]]></content:encoded></item><item><title><![CDATA[Industry Webinar: Closing the AD Privileged Access Gap]]></title><description><![CDATA[The Changing Face of PAM]]></description><link>https://radar.thecyberhut.com/p/industry-webinar-closing-the-ad-privileged</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/industry-webinar-closing-the-ad-privileged</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 12 Mar 2026 11:26:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uSLi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Changing Face of PAM</h2><p>Privileged access management (PAM) has undergone a tremendous evolution in the past 5 years. No longer are we focused solely on a subset of systems - that only reside within an on-premises environment. Organisations have to contend with a broader array of identities, high risk systems and deployment models that span on-prem, private cloud, infrastructure, containers and SaaS environments.</p><p>The breadth and depth of identity types has increased too - from server root accounts, to workloads, service accounts and more latterly specific instances of non-human identities (NHI) along with agentic-AI too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TkSK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TkSK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:480555,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TkSK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!TkSK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa01c1258-73d2-4bc8-873e-67b51828a8b3_960x540.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That initial PAM deployment model - using credential rotation and checkout services alongside basic vaulting - only really supported a subset of the critical high risk systems under management. As the number of variety of systems and services under management increased, the approach to privilege evolved too. </p><div><hr></div><h2>Is AD the PAM Weak Link?</h2><p>If we pick on Active Directory (AD) for a second, has it become the weak link in the privileged access battle? AD was not built for security. In 2000 the basic security design pattern was built upon private/public network boundaries - coarse grained trust areas that focused on location and IP address. Fast forward to 2026 and organisations design via a zero trust approach - often with the assumption that &#8220;controlled&#8221; network components and applications are really open to internet access and likely be &#8220;breached&#8221; already by unauthorised users. </p><p>Whilst AD is not solely a PAM platform, it does contain high risk identities, along with being a jump off point for service accounts, administration functions and a broad array of infrastructure support and configuration functions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NWMr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NWMr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:828969,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NWMr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!NWMr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba85570d-b441-4a2b-80e0-34d7af4937fe_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Remote access approaches such as VPNs, RDP, MS Terminal Services and RADIUS may well leverage AD as a repository, before vectoring off into an array of on-prem and cloud-integrated relying parties, applications and federated services. But has AD kept up with the variety and complexity of identity related attacks that target both standard and high risk accounts?</p><p>Being at the centre of enterprise identity, it can become a fulcrum for cross-identity, privilege-abuse related flows for both internal and external adversarial activity.</p><div><hr></div><h2>What Does Modern PAM Look Like?</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oTjI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oTjI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:894496,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oTjI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!oTjI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a1d6a8-9bf4-42f5-8843-17919dbce4d6_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>PAM is a journey - an evolution - that many organisations are embarking on. We are starting to see PAM require a broader set of integrated identities and systems, but also from an AD point of view, identify a more flexible and just in time approach that covers service accounts and high risk events.</p><p>A consistent approach to high-risk access across AD and related systems is needed - that allows organisations to &#8220;scale-up&#8221; their security strategy to include NHI, agentic-AI and hybrid deployment model.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uSLi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uSLi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f681024-148b-4074-8ff4-bc742e01010b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/190713397?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uSLi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!uSLi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f681024-148b-4074-8ff4-bc742e01010b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Cyber Hut&#8217;s next industry webinar will be tackling this topic in more detail. The Cyber Hut founder Simon Moffatt will be in conversation with EMEA Chief Identity Security Advisor Rob Ainscough from <a href="https://www.silverfort.com/">Silverfort</a> on March 16th.</p><p>They&#8217;ll explore:</p><ol><li><p>Why traditional PAM models break down in modern, identity-driven environments</p></li><li><p>How runtime, identity-aware enforcement changes the privileged access security model</p></li><li><p>How organizations can expand privileged access coverage to meet protection goals - without slowing the business down</p></li><li><p>How to mitigate the risk of static human and non-human credentials, and move to Zero Standing Privilege</p></li><li><p>How to mature from protecting accounts, to blast radius controls &amp; containing risk</p></li></ol><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Reserve Your Seat</span></a></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Market Guide to Securing the Production Stack]]></title><description><![CDATA[A research report for understanding the modern privileged access management space]]></description><link>https://radar.thecyberhut.com/p/market-guide-to-securing-the-production</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/market-guide-to-securing-the-production</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 06 Mar 2026 16:10:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SYUk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd42be42a-6765-4b68-ac2f-b8d675fb426d_863x976.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Executive Summary</h2><p>Modern production infrastructure has outpaced traditional Privileged Access Management (PAM), leading to an increase in the identity attack surface along with significant operational drag. </p><p>Traditional, on-premises, vault-centric PAM systems, which were designed for a small, static set of accounts, can no longer manage the breadth of modern systems, protocols, and identity types, including human, non-human, and agentic identities. </p><p>This complexity results in over-provisioned, standing privileges and slow, manual access workflows that frustrate developers and increase risk. This guide outlines a strategic shift from legacy, isolated PAM to an Identity-Native, API-first model that supports a decoupled, &#8220;zero-touch&#8221; production access environment.</p><p>Capabilities in this modern approach leverage:</p><ul><li><p><strong>Just-in-Time (JIT) access and Zero Standing Privilege (ZSP):</strong> JIT allows identities to request access only when needed, and only for as long as needed, which is critical for minimizing the identity attack surface and enforcing a least-privilege policy. (See our Academy <a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">episode</a> for an explainer on JiT and ZSP)</p></li><li><p><strong>Broad, consistent coverage:</strong> A modern privileged access platform must cover the full spectrum of high-risk assets, including cloud consoles, databases, Kubernetes and code repositories, and all identity types, particularly non-human identities (NHIs) which often hold unchecked privileged access.</p></li></ul>
      <p>
          <a href="https://radar.thecyberhut.com/p/market-guide-to-securing-the-production">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Okta and Crowdstrike Earnings Update, Veza+ServiceNpw for Agent Identity, Ping and PAM Plan]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/okta-and-crowdstrike-earnings-update</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/okta-and-crowdstrike-earnings-update</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 05 Mar 2026 12:05:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 style="text-align: center;">Strategic &amp; Emerging Headlines</h2><h3 style="text-align: center;">Curated Industry Announcements</h3><ul><li><p><a href="https://www.cerbos.dev/blog/overcoming-iam-blind-spots-and-fragmentation-for-continuous-governance">Cerbos: Overcoming IAM blind spots and fragmentation for continuous governance</a></p></li><li><p><a href="https://www.fool.com/earnings/call-transcripts/2026/03/03/crowdstrike-crwd-q4-2026-earnings-transcript/">CrowdStrike (CRWD) Q4 2026 Earnings Transcript</a></p></li><li><p><a href="https://www.fool.com/earnings/call-transcripts/2026/03/04/okta-okta-q4-2026-earnings-call-transcript/">Okta (OKTA) Q4 2026 Earnings Call Transcript</a></p></li><li><p><a href="https://www.pingidentity.com/en/resources/blog/post/pingone-privilege-delivers-just-in-time-zero-standing-access.html?utm_source=radar.thecyberhut.com">Ping Identity: Privileged Access Is Broken&#8230;</a></p></li><li><p><a href="https://www.secureauth.com/resources/the-hidden-attack-surface-why-your-identity-vendor-is-your-biggest-security-risk/?utm_source=radar.thecyberhut.com">SecureAuth: Why Your Identity Vendor Is Your Biggest Security Risk</a></p></li><li><p><a href="https://veza.com/blog/veza-servicenow-the-enterprise-agent-identity-control-plane/?utm_source=radar.thecyberhut.com">Veza + ServiceNow: The Enterprise Agent Identity Control Plane</a></p></li></ul><h3 style="text-align: center;">Identity Threat Intelligence Updates</h3><ul><li><p><a href="https://www.invictus-ir.com/news/entra-oauth-risk-consent-epidemic?utm_source=radar.thecyberhut.com">The Silent SaaS Threat</a></p></li><li><p><a href="https://www.offensai.com/blog/eventual-consistency-resistant-iam-containment-aws-incident-response?utm_source=radar.thecyberhut.com">AWS Incident Response: IAM Containment That Survives Eventual Consistency</a></p></li><li><p><a href="https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules?utm_source=radar.thecyberhut.com">Google API Keys Weren&#8217;t Secrets. But then Gemini Changed the Rules</a></p></li><li><p><a href="https://www.proofpoint.com/us/blog/threat-insight/disruption-targets-tycoon-2fa-popular-aitm-phaas?utm_source=radar.thecyberhut.com">Disruption targets Tycoon 2FA, popular AiTM PhaaS</a></p></li><li><p><a href="https://redcanary.com/blog/threat-detection/google-workspace-oauth-attack/?utm_source=radar.thecyberhut.com">Breaking down a supply chain attack via a malicious Google Workspace OAuth app</a></p></li><li><p><a href="https://thehackernews.com/2026/02/identity-cyber-scores-new-metric.html">Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026</a></p><p style="text-align: center;"></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Industry Webinar</strong></h2><p style="text-align: center;"><strong>Closing the AD Privileged Access Gap</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6B0E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:987041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6B0E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!6B0E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39afbdc4-fa58-4d50-a743-29096a8d0d51_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA&quot;,&quot;text&quot;:&quot;Register to Attend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/8617721168804/WN_PUH2VCjRTUK48hIjVIu9eA"><span>Register to Attend</span></a></p><div><hr></div><h2 style="text-align: center;"><strong>Up Coming Event Attendance</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ghww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ghww!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 424w, https://substackcdn.com/image/fetch/$s_!ghww!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 848w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1272w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png" width="590" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:590,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:338308,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189978782?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ghww!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 424w, https://substackcdn.com/image/fetch/$s_!ghww!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 848w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1272w, https://substackcdn.com/image/fetch/$s_!ghww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2cbd9753-01cc-4903-b696-2c3076fb1a6a_590x619.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://info.orchid.security/iam-at-2035?utm_source=thecyberhut.com">Orchid Security Community Event</a> - London - March 12</p><p style="text-align: center;"><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p><p style="text-align: center;"><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p><p style="text-align: center;"><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p><p style="text-align: center;"><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p><div><hr></div><h2 style="text-align: center;">Downloadable Cheat Sheets</h2><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p><p style="text-align: center;">Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: center;">Latest Identity Security Vendor Reports</h2><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p><p style="text-align: center;"><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p><div><hr></div><h2 style="text-align: center;"><strong>A Demo Discussion on JiT for CSP</strong></h2><p style="text-align: center;">A demo walk through by P0 Security taking a look at just in time access for cloud service provider components such as S3 storage buckets</p><div id="youtube2-3BSI0gRu1GQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3BSI0gRu1GQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3BSI0gRu1GQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Podcast Episode</h3><p style="text-align: center;">E69 The Analyst Brief: The Rise of IAM Resilience and Why Semperis is buying MightyID</p><div id="youtube2-1Nr4QTrB26A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1Nr4QTrB26A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1Nr4QTrB26A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Research Report</strong></h3><p style="text-align: center;"><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: center;"><strong>A Fireside Chat with Identity at the Center Podcast</strong></h3><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;">Latest Analyst Insight</h3><p style="text-align: center;"><a href="https://www.reveal.security/blog/pre-emptive-identity-security-getting-started?utm_source=radar.thecyberhut.com">Pre-Emptive Identity Security: Getting Started</a></p><p style="text-align: center;"> <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p><p style="text-align: center;"><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p><p style="text-align: center;"><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p><p style="text-align: center;"><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Recent Industry Webinars</strong></h3><p style="text-align: center;"><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p><p style="text-align: center;"><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p><p style="text-align: center;">Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p><p style="text-align: center;"><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p><p style="text-align: center;"><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p><p style="text-align: center;"><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Training Academy Episodes</strong></h3><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and">39: What is Just in Time access and Zero Standing Privileges?</a></p><p style="text-align: center;"><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p><p style="text-align: center;">37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p><p style="text-align: center;">36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p><p style="text-align: center;">35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Vendor Assessment Report</strong></h3><p style="text-align: center;">As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Our Recent Vendor Introduction Interviews</strong></h3><p style="text-align: center;">Interviews with <a href="https://www.reva.ai/">Reva</a>.ai and <a href="https://www.scalekit.com/">Scalekit</a></p><div id="youtube2-pgUMhgIcNRE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pgUMhgIcNRE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pgUMhgIcNRE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3 style="text-align: center;"><strong>Latest Video Shorts: Podcast and Interview Highlights</strong></h3><div id="youtube2-_eav1LGJRgM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;_eav1LGJRgM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/_eav1LGJRgM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-QMi4_JM8DSs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;QMi4_JM8DSs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/QMi4_JM8DSs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-Xk4w35ar1_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Xk4w35ar1_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Xk4w35ar1_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-ae-qa4YBYbo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ae-qa4YBYbo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ae-qa4YBYbo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-p8nYyvRmHb4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;p8nYyvRmHb4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/p8nYyvRmHb4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3 style="text-align: center;"><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p style="text-align: center;"><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p><p style="text-align: center;"><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download IAM Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/vendor-map/"><span>Download IAM Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[The Rise of Autonomous Ticket Resolution]]></title><description><![CDATA[Why AI Digital Employees Can Improve IAM]]></description><link>https://radar.thecyberhut.com/p/the-rise-of-autonomous-ticket-resolution</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/the-rise-of-autonomous-ticket-resolution</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Mon, 02 Mar 2026 10:13:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YXHb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>IAM Ticket Resolution Today: Oversubscribed and Ineffective</h2><ul><li><p>Broad variety of ticket types</p></li><li><p>Lack of fulfilment efficiency</p></li></ul><p>Service desk ticketing systems today are routinely overworked and ineffective when it comes to identity and access management (IAM) - and for several core reasons. The volume and variety of identity types and systems has increased - but so have the volume and variety of tickets being raised.</p><p>Broad and disjointed multi-factor authentication (MFA) strategies typically correlate with an increase in enrolment issues, as well as the avoidable troubles associated with credential and password reset work flows.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YXHb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YXHb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 424w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 848w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1272w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png" width="847" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:847,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:290582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189631482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YXHb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 424w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 848w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1272w, https://substackcdn.com/image/fetch/$s_!YXHb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8ccfc87-fd9b-4657-9239-6bf1db1d6ac7_847x469.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>New user on-boarding inevitably generates interactions with respect to device configuration and a lack of familiarity with technology or systems registration. But ultimately it is in the access management and misalignment domain that are generating the most interactions - many of which are becoming complex to complete and fulfil.</p><p>Many of these requests are repeatable, routine and avoidable - yet are still being completed by human operators. Requests often lack the appropriate level of context and detail - missing basic details such as the user&#8217;s current role or access, a system owner or a more risk-aligned description of what is needed and why.<br></p><p>Fulfilment times are increasing too as a result. The breadth and depth of request coverage likely means that many downstream systems are disconnected from the core automated provisioning apparatus - resulting in error prone and customised fulfilment of access additions or removals. A lack of context can also impair risk based decision making as it comes to changing access that is in alignment with both business requirements and security controls.</p><div><hr></div><h2>Risk Increasing &amp; Productivity Decreasing</h2><ul><li><p>Lack of consistency</p></li><li><p>Human error and complex operating procedures</p></li></ul><p>The impact of this is not just overworked employees and inefficient service desk fulfilment. As the strategic role of IAM has increased to enable productivity, security and revenue generation opportunities, the ineffectiveness of ticket management creates systemic failures in many parts of the modern business.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mqnd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mqnd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 424w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 848w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1272w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png" width="675" height="713" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee354cba-64ad-446c-b513-03bb71f21053_675x713.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:713,&quot;width&quot;:675,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239882,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/189631482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mqnd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 424w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 848w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1272w, https://substackcdn.com/image/fetch/$s_!mqnd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee354cba-64ad-446c-b513-03bb71f21053_675x713.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Delays in access fulfilment have a material impact on risk management. A slowdown in access removal - be it for a terminated employee, insider threat scenario or task completion - introduces significant issues with respect to privilege escalation opportunities or privilege abuse. In addition to delay, a lack of context, disconnected systems and human-centric process results in inconsistent completion and a lack of repeatable execution. This has a cascading effect on both productivity and risk.</p><p>Productivity also needs to be considered from both a fulfilment and end user point of view. A lack of context, repeatability and manual completion results in reduced effort to closure rates, but delays and inconsistencies in closure impact the end user too. Ticket bounce backs - often due to incorrectly assigned permissions or the removal of the wrong permissions - prevent task completion or result in timely escalations with no clear incident resolution pathway.</p><div><hr></div><h2>Rise of The AI Digital Employee: Automation, Consistency, Repeatability</h2><ul><li><p>Specialised learning based on company and context</p></li><li><p>Human augmentation</p></li></ul><p>So what can be done? Vendors like <a href="https://www.twinesecurity.com/">Twine Security</a> are certain that the rise of the AI digital employee is showing significant inroads in solving some of these key issues. An ability to train an agent with the specific nuances of an organisation, system and their joiner-mover-leaver processes is now quite possible. AI thrives on data - and the data relating to how an organisation manages their identity and access management processes is often readily available. This form of specialist learning is critical.</p><blockquote><p><a href="https://www.twinesecurity.com/">Twine Security</a> describe themselves as: <em>&#8220;Reduce manual cybersecurity work by 70% with Twine's AI Digital Employees.  Automate identity management, cut costs, and improve team efficiency.&#8221;</em></p></blockquote><p>Not all organisations are the same. Not all on-boarding and off-boarding processes are the same. Access request approvals will vary, the connected systems will vary and how they are connected will also vary. And as technology never lives in a vacuum, all of these components are constantly in a state of flux - which many traditional IAM systems fail to handle - often designed from a very static point of view. Each of these components and workflows will also see execution variability based on a combination of end user involved in the request, the approver and the context too. AI of course is designed to consume both vast amounts of data but also the nuances within it - allowing optimisation to take place.</p><p>A key part of deploying not just digital employees but agentic-AI in general, is building trust. Trust from an interaction point of view but also from an operational perspective. Evidence of hallucination and negative optimisation are now common, so it becomes critical to leverage a digital employee function that knows its own limitations. Knows when risk is present, a lack of information is present and knows when an optimal outcome can not be achieved without human guidance. It is important the agentic-approach not only knows when to escalate, but how to escalate.</p><div><hr></div><h2>Full Accountability, With Strategic Automation</h2><ul><li><p>Smarter decision making</p></li><li><p>Operational improvement</p></li><li><p>Security and audit traceability</p></li></ul><p>There are touch-points where guardrails are critical. Initial on-boarding with respect to agent credential configuration, permissioning and credential issuance should be deterministic and transparent. This on-boarding process is critical to understand the existing nuance of both manual and automated processes - why have they been created, what might go wrong and who from an approval and escalation process is needed to complete both the happy and unhappy paths.</p><p>That learning process should also contribute to the identification of data concerns, or inefficiencies with respect to process or execution. By analysing existing processes and the ticket instances that have previously been completed, digital employees should be able to understand patterns and capture the subtle context needed (or lacking) to accelerate completion.</p><p>The immediate metric of success is operational improvement. Tickets can be fulfilled faster, with more automation and more consistency, but can also be optimised. Redundant stages, poorly completed or missing form entries can all be removed.</p><p>The key to both adoption and continual improvement is the ability to have full traceability of all of the AI digital employee events and ticket fulfilment stages. Audit and monitoring of all individual events and tasks is a given, but also the linkage back to a carbon life-form. This essentially is supporting the &#8220;on-behalf&#8221; of authorization flow for agentic-AI where it is critical to understand why and how an employee was triggered and is it authorised.</p><p>IAM is complex. Organisations have to deal with a range of asymmetric information problems, disconnected systems, missing workflows and an increasing rise in the volume and variety of identities and systems under management. The rise of Agentic AI adoption across all parts of the technology landscape is delivering huge productivity gains and competitive opportunities. The specific focus on the often stagnant IAM fulfilment flows will reduce considerable effort and security risk that many organisations are now facing.</p><div><hr></div><p>An interview with Twine Security for The Cyber Hut&#8217;s vendor introduction series:</p><div id="youtube2-voMfdd4ldZ4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;voMfdd4ldZ4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/voMfdd4ldZ4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p><strong>About The Author</strong></p><p>Simon Moffatt has over 25 years experience in IAM, cyber and identity security. He is founder of <a href="https://www.thecyberhut.com/">The Cyber Hut</a> - a specialist research and advisory firm based out of the UK. He is author of <a href="https://a.co/d/7oO2oOW">CIAM Design Fundamentals</a> and <a href="https://www.thecyberhut.com/iam%20at%202035/">IAM at 2035</a>: A Future Guide to Identity Security. He is a Fellow of the Chartered Institute of Information Security, a regular keynote speaker and a strategic advisor to entities in the public and private sectors.</p><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[IGA Success Metrics Template]]></title><description><![CDATA[How to measure modern identity governance and administration platforms]]></description><link>https://radar.thecyberhut.com/p/iga-success-metrics-template</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/iga-success-metrics-template</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 27 Feb 2026 16:51:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4acf14ef-0c79-4fcb-be2e-3eb454d1b828_779x721.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>1. Security and Risk Reduction Metrics</h2><p>The primary goal of a modern identity governance and administration (IGA) solution is to enforce concepts like the <strong>Principle of Least Privilege</strong> and actively reduce the identity attack surface, as emphasized in the transition to <strong>Zero Standing Privilege (ZSP)</strong> and the focus on <strong>Identity Security Posture Management (ISPM)</strong>.</p><ul><li><p><strong>Access Risk Reduction:</strong> Target a reduction in users with unneeded or excessive access (Orphaned Accounts, Stale Access).</p></li><li><p><strong>Segregation of Duties (SoD) Violations:</strong> Decrease in total SoD policy violations by a measurable percentage within a finite timeframe (e.g. within 6 months).</p></li><li><p><strong>Time-to-Remediation:</strong> Decrease the time required to revoke access for high-risk or compromised identities.</p></li></ul>
      <p>
          <a href="https://radar.thecyberhut.com/p/iga-success-metrics-template">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Apono Agentic Report, Auth0 B2C Revenue Analysis, SentinelOne IAM Offering, P0 AuthZ Plane for AI]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/apono-agentic-report-auth0-b2c-revenue</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/apono-agentic-report-auth0-b2c-revenue</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 26 Feb 2026 10:35:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/1Nr4QTrB26A" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h3>Curated Industry Announcements</h3><ul><li><p><strong>Apono</strong>: <a href="https://www.prnewswire.com/news-releases/new-apono-report-reveals-98-of-cybersecurity-leaders-are-slowing-agentic-ai-adoption-due-to-insufficient-security-controls-302696914.html">New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls</a></p></li><li><p><strong>Auth0</strong>: <a href="https://auth0.com/blog/revenue-potential-shared-accounts-fga/?utm_source=radar.thecyberhut.com">The Revenue Potential of Shared Accounts With Fine-Grained Authorization (FGA)</a></p></li><li><p><strong>CrowdStrike</strong>: <a href="https://www.crowdstrike.com/en-us/blog/exposing-insider-threats-through-data-protection-identity-hr-context/?utm_source=radar.thecyberhut.com">Exposing Insider Threats through Data Protection, Identity, and HR Context</a></p></li><li><p><strong>Gathid</strong>: <a href="https://gathid.com/news/the-silent-breach-how-organizational-drift-becomes-an-identity-threat/?utm_source=radar.thecyberhut.com">The Silent Breach: How Organizational Drift Becomes An Identity Threat</a></p></li><li><p><strong>LoginRadius</strong>: <a href="https://www.loginradius.com/blog/engineering/what-is-mcp-authorization">MCP Authorization: The Key to Safe and Simple AI Integrations</a></p></li><li><p><strong>P0 Security</strong>: <a href="https://www.p0.dev/pr/authz-control-plane-nhis-ai-agents?utm_source=radar.thecyberhut.com">P0 Security extends its Authz Control Plane to service accounts, workloads and AI agents</a></p></li><li><p><strong>Ping Identity</strong>: <a href="https://www.pingidentity.com/en/resources/blog/post/iron-bank-containers-strengthen-dow-data-security.html?utm_source=radar.thecyberhut.com">Ping Identity&#8217;s Secure Containers in Iron Bank Strengthen DOW Data Security</a></p></li><li><p><strong>Saviynt</strong>: <a href="https://saviynt.com/press-release/amazon-q-ai-identity-security-integration?utm_source=radar.thecyberhut.com">Saviynt bolsters Its AI-powered Identity Security through integrations with Amazon Quick</a></p></li><li><p><strong>SentinelOne</strong>: <a href="https://www.sentinelone.com/press/sentinelone-unveils-new-identity-portfolio-and-strategy/?utm_source=radar.thecyberhut.com">SentinelOne Unveils New Identity Portfolio and Strategy for Securing Human and Non-Human Identities</a></p></li><li><p><strong>Segura</strong>: <a href="https://segura.security/post/riverwood-capital-investment/?utm_source=radar.thecyberhut.com">Announces $25M Growth Round from Riverwood Capital to Strengthen Identity Security Platform</a></p></li><li><p><strong>Teleport</strong>: <a href="https://goteleport.com/blog/how-to-secure-microservices-spiffe-istio/?utm_source=radar.thecyberhut.com">From Zero Trust to SPIFFE: How to Secure Microservices with Istio and Teleport</a></p></li><li><p><strong>Veza</strong>:<strong> </strong><a href="https://veza.com/blog/veza-the-enterprise-agent-identity-control-plane/?utm_source=radar.thecyberhut.com">The Enterprise Agent Identity Control Plane</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://semgrep.dev/blog/2026/openclaw-security-engineers-cheat-sheet/?utm_source=radar.thecyberhut.com">OpenClaw Security Engineer&#8217;s Cheat Sheet</a></p></li><li><p><a href="https://www.wiz.io/blog/detecting-malicious-oauth-applications?utm_source=radar.thecyberhut.com">Would You Click &#8216;Accept&#8217;? Automatically detecting malicious Azure OAuth applications using LLMs</a></p></li><li><p><a href="https://cloudsecurityalliance.org/blog/2026/02/20/openclaw-threat-model-maestro-framework-analysis">OpenClaw Threat Model: MAESTRO Framework Analysis</a></p></li><li><p><a href="https://socradar.io/blog/make-digital-asset-inventory/?utm_source=radar.thecyberhut.com">How to Make a Digital Asset Inventory?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture">Agentic-AI Security Architecture Example</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gK-k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png" width="784" height="994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:784,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:432283,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gK-k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 424w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 848w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1272w, https://substackcdn.com/image/fetch/$s_!gK-k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb52f714c-2558-4caa-b384-fd6f270c83d3_784x994.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Identity Security Vendor Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li></ul><div><hr></div><h2>Recent Content Updates</h2><h2><strong>A Demo Discussion on JiT for CSP</strong></h2><ul><li><p>A demo walk through by P0 Security taking a look at just in time access for cloud service provider components such as S3 storage buckets</p></li></ul><div id="youtube2-3BSI0gRu1GQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;3BSI0gRu1GQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/3BSI0gRu1GQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>Our Recent Podcast Episodes</h3><ul><li><p>E69 The Analyst Brief: The Rise of IAM Resilience and Why Semperis is buying MightyID&#8230;</p><p></p><div id="youtube2-1Nr4QTrB26A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1Nr4QTrB26A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1Nr4QTrB26A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Our Recent Research Reports:</strong></h3><ul><li><p><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>Our Recent Comments and Analyst Insight</strong></h3><ul><li><p>A fireside chat with the Identity at the Center podcast on Identity Security:</p></li></ul><div id="youtube2-nEfV6tUKR10" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nEfV6tUKR10&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nEfV6tUKR10?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>The Identity Underground 2026 Pulse: <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Our Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Our Recent Training Academy Episodes</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Our Recent Deep Dive Vendor Assessment Reports</strong></h3><p>As assessment of <a href="https://www.radiantlogic.com/">Radiant Logic</a> - analysing their identity-data view of ISPM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dqbr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png" width="942" height="907" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:907,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:367726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188478185?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dqbr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 424w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 848w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1272w, https://substackcdn.com/image/fetch/$s_!Dqbr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c95252d-fdd2-4eda-91b1-cacfe88cef05_942x907.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com&quot;,&quot;text&quot;:&quot;Download Here&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.radiantlogic.com/resource/the-cyber-hut/?utm_source=radar.thecyberhut.com"><span>Download Here</span></a></p><div><hr></div><h3><strong>Our Recent Vendor Introduction Interviews</strong></h3><p>What is the new auth-stack? We sat down with <a href="https://www.scalekit.com/">Scalekit</a> to find out more&#8230;</p><div id="youtube2-yWgMUFqJyqw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yWgMUFqJyqw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yWgMUFqJyqw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Our Recent Video Shorts</strong></h3><div id="youtube2-Xk4w35ar1_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Xk4w35ar1_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Xk4w35ar1_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-ae-qa4YBYbo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ae-qa4YBYbo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ae-qa4YBYbo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-p8nYyvRmHb4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;p8nYyvRmHb4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/p8nYyvRmHb4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Cheat Sheet: Agentic-AI Security Architecture Example]]></title><description><![CDATA[A working document to broaden awareness of a holistic AI security pattern]]></description><link>https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/cheat-sheet-agentic-ai-security-architecture</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 17 Feb 2026 12:46:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eanl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eanl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 424w, https://substackcdn.com/image/fetch/$s_!eanl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 848w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1272w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png" width="818" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:818,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:563813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/188254238?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eanl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 424w, https://substackcdn.com/image/fetch/$s_!eanl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 848w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1272w, https://substackcdn.com/image/fetch/$s_!eanl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa711daef-288e-4da5-8ee8-74f1c50c4089_818x731.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Agent Identity and Access Management</strong></h2><p>We need to verify the agent's identity via attestation, before issuing bound credentials and unique attributes. We need to be dynamically granting access to data, apps, and other agents. All wrapped in ephemeral and just-in-time concepts.</p><p><strong>Considerations:</strong> </p><ul><li><p>Secret-zero issue - how to attest processes or requesting party before credentials are minted, issued and bound</p></li><li><p>How to identify what permissions an agent needs?</p></li><li><p>How to verify a human has access to an agent?</p></li><li><p>Should the agent &#8220;claim&#8221; permissions from the requesting party?</p></li><li><p>How to handle agent to agent combined permissions risk and union of access?</p></li><li><p>How to handle MFA requirements? Is a possession factor enough?</p></li><li><p>Should credentials be auto-rotated, or rotated only during high risk?</p></li></ul><div><hr></div><h2><strong>Data and Knowledge Protection</strong></h2><p>Policies are needed to prevent unauthorized use of critical data by AI agents, ensuring access permissions are based on the type of data or resource being accessed - so this is a combination of PEP and also data confidentiality protection measures. </p><p><strong>Considerations:</strong></p><ul><li><p>Can existing DLP and DSPM products support the necessary discovery, classification and risk tagging of data resources?</p></li><li><p>Can data objects be protected at rest, in transit and in use?</p></li><li><p>Are concepts like homomorphic encryption and multi-party computing, understood, applicable?</p></li><li><p>Are integrity protection mechanisms necessary?</p></li><li><p>Are content authenticity measures in place? Are they scaleable? Can they be verified offline and at scale?</p></li><li><p>How is the data returned back from an agent protected?</p></li></ul><div><hr></div><h2><strong>Agent Operational Integrity and Resilience</strong> </h2><p>We need to ensure the agent's behavioral integrity is upheld by detecting and preventing tampering, drifting off-task, or malicious manipulation. This is tricky as some behaviour changes are expected for optimization and learning.</p><p><strong>Considerations:</strong></p><ul><li><p>What does success look like for an agent?</p></li><li><p>Can that success be articulated during creation?</p></li><li><p>Can agents be compared to each other?</p></li><li><p>Can and should agent behaviour be compared and tied to a human-requestor&#8217;s behaviour?</p></li><li><p>Are historical behaviour patterns for agents useful?</p></li><li><p>Agents are likely to be targets - how can they be protected?</p></li><li><p>Can they be stolen, replicated, impersonated?</p></li></ul><div><hr></div><h2><strong>Agentic Governance, Risk and Compliance (GRC)</strong></h2><p>We need to establish guidelines for agent behavior, risk changes, and ensuring that the agent's actions are auditable and traceable. Everything needs to be in sync for regulatory adherence.</p><p><strong>Considerations:</strong></p><ul><li><p>End to end traceability is important - that links agent tasks to human tasks</p></li><li><p>Can agent actions be reversed?</p></li><li><p>At what point do agent events need approval?</p></li><li><p>What is the process for agent creation?</p></li><li><p>What level of explainability is available?</p></li><li><p>What level of agent action transparency is available?</p></li></ul><div><hr></div><h2><strong>Policy Engine with Runtime Enforcement</strong></h2><p>A system that provides granular, adaptive access control that changes dynamically based on real-time context and assessed risk levels. It enforces policies for access to corporate systems, inter-agent sharing, access periods (JIT), and memory retention. Can today&#8217;s human-centric PBAC systems do this?</p><p><strong>Considerations:</strong></p><ul><li><p>How are policies created?</p></li><li><p>How are policies stored and made available to enforcing systems?</p></li><li><p>Are policies part of the governance model?</p></li><li><p>How are policies changed and analysed for effectiveness?</p></li><li><p>How should policy be changed post-incident?</p></li><li><p>Can enforcement points scale and be effective away from a central hub?</p></li></ul><div><hr></div><h2><strong>Human Oversight, Accountability, and Attribution</strong></h2><p>We need to ensure that all actions by autonomous agents can be traced back to an originating human user or organizational policy, often utilizing "human-in-the-loop" mechanisms for critical or sensitive actions.</p><p><strong>Considerations:</strong></p><ul><li><p>These are extension points that anchor both policy design and enforcement and how the GRC components are executed</p></li></ul><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Palo+CyberArk Completes, Omada State of IGA '26, AuthSignal Account Recovery, GitGuardian $50M Series C]]></title><description><![CDATA[Plus a round up of Identity Threat Intelligence updates]]></description><link>https://radar.thecyberhut.com/p/palocyberark-completes-omada-state</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/palocyberark-completes-omada-state</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 12 Feb 2026 12:25:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h3>Curated Industry Announcements</h3><ul><li><p><strong>Auth0</strong>: <a href="https://auth0.com/blog/securing-amazon-bedrock-agentcore-agents-auth0-for-ai-agents/?utm_source=radar.thecyberhut.com">A Guide to Securing Amazon Bedrock AgentCore with Auth0 for AI Agents</a></p></li><li><p><strong>AuthSignal</strong>: <a href="https://www.authsignal.com/blog/articles/account-recovery-is-the-identity-industrys-most-overlooked-challenge?utm_source=radar.thecyberhut.com">Account recovery is the identity industry&#8217;s most overlooked challenge</a></p></li><li><p><strong>Axiomatics</strong>: <a href="https://axiomatics.com/blog/2026-a-reflection-on-whats-ahead-for-axiomatics-authorization-agentic-ai-and-more?utm_source=radar.thecyberhut.com">2026: A reflection on what&#8217;s ahead for Axiomatics, authorization, agentic AI, and more</a></p></li><li><p><strong>Cisco</strong>: <a href="https://blogs.cisco.com/security/redefining-security-for-the-agentic-era?utm_source=radar.thecyberhut.com">Redefining Security for the Agentic Era</a></p></li><li><p><strong>CyberArk</strong> (Palo Alto): <a href="https://www.cyberark.com/resources/blog/identity-security-is-the-foundation-of-the-ai-era?utm_source=radar.thecyberhut.com">Identity Security Is the Foundation of the AI Era</a></p></li><li><p><strong>CyberArk: </strong><a href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-completes-acquisition-of-cyberark-to-secure-the-ai-era?utm_source=radar.thecyberhut.com">Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era</a></p></li><li><p><strong>GitGuardian</strong>: <a href="https://pulse2.com/gitguardian-50-million-series-c/">$50 Million Series C Raised For Secrets And Non-Human Identity Security Platform</a></p></li><li><p><strong>Hydden</strong>: <a href="https://hydden.com/blog/why-nobody-owns-your-most-privileged-accounts/?utm_source=radar.thecyberhut.com">Why Nobody Owns Your Most Privileged Accounts</a></p></li><li><p><strong>Omada</strong>: <a href="https://omadaidentity.com/resources/analyst-reports/ty-omada-state-of-iga/?utm_source=radar.thecyberhut.com">Read The State of Identity Governance 2026</a></p></li><li><p><strong>Teleport</strong>: <a href="https://goteleport.com/blog/prevent-prompt-injection/?utm_source=radar.thecyberhut.com">How to Prevent Prompt Injection in AI Agents</a></p></li><li><p><strong>Yubico</strong>: <a href="https://www.helpnetsecurity.com/2026/02/11/yubico-yubikey-yubikey-passkey-digital-signatures/">Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://pypi.org/project/astrix-openclaw-scanner/">Astrix Openclaw Scanner</a></p></li><li><p><a href="https://medium.com/@alexandrevandammepro/the-5-most-valuable-credential-types-hidden-in-stealer-logs-b7c4d4548c5d">The 5 Most Valuable Credential Types Hidden in Stealer Logs</a></p></li><li><p><a href="https://www.darkreading.com/threat-intelligence/zerodayrat-brings-commercial-spyware-to-mass-market">In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'</a></p></li><li><p>Keys to JWT Assessments - <a href="https://trustedsec.com/blog/keys-to-jwt-assessments-from-a-cheat-sheet-to-a-deep-dive?utm_source=radar.thecyberhut.com">From a Cheat Sheet to a Deep Dive</a></p></li><li><p><a href="https://venturebeat.com/security/recruitment-fraud-cloud-iam-2-billion-attack-surface">How recruitment fraud turned cloud IAM into a $2 billion attack surface</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-application-governance">Application Governance</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-agentic-ai-identity-security">Agentic-AI Identity Security</a></p></li></ul><div><hr></div><h2>Identity Security Vendor Summary Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/silverfort">Silverfort</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" width="991" height="998" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:998,&quot;width&quot;:991,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178126,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/183535050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Content Updates</h2><h3>Improving the MTTA</h3><ul><li><p>A deep dive into the concept of improving the mean time to access for a range of different stakeholders to a broad array of high risk systems</p></li></ul><div id="youtube2-U7Xiz_8NZww" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;U7Xiz_8NZww&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/U7Xiz_8NZww?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Most Recent Industry Webinar</strong></h3><ul><li><p><strong>3 December</strong> - Modernizing AD Protection Against Lateral Movement and Privileged Access Abuse with Silverfort</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bkkd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/180490079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration"><span>Reserve Your Seat</span></a></p><div><hr></div><h3>Our Recent Podcast Episodes</h3><ul><li><p>E69 The Analyst Brief: The Rise of IAM Resilience and Why Semperis is buying MightyID&#8230;</p><p></p><div id="youtube2-1Nr4QTrB26A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1Nr4QTrB26A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1Nr4QTrB26A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Our Recent Research Reports:</strong></h3><ul><li><p><a href="https://cdn.prod.website-files.com/6711cd0559bf05b4faea0ea0/6980fbfd3c4299678a5d23ec_Buyers%20guide%20to%20securing%20the%20production%20stack_fnl.pdf?utm_source=radar.thecyberhut.com">A Market Guide to Securing the Production Stack</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IknN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png" width="679" height="779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:779,&quot;width&quot;:679,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:371949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187728420?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IknN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 424w, https://substackcdn.com/image/fetch/$s_!IknN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 848w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1272w, https://substackcdn.com/image/fetch/$s_!IknN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c441e3f-2010-487f-a8f4-ee6fc665886a_679x779.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>Our Recent Comments and Analyst Insight</strong></h3><ul><li><p>OpenClaw: A Productivity &amp; Cyber Security Clash</p></li></ul><div id="youtube2-DRGxaQ5Kgto" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;DRGxaQ5Kgto&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/DRGxaQ5Kgto?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>The Identity Underground 2026 Pulse: <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li><li><p><a href="https://www.p0.dev/blog/why-pam-needs-to-evolve?utm_source=radar.thecyberhut.com">Why PAM Needs to Evolve</a></p></li><li><p><a href="https://www.reveal.security/blog/shifting-left-of-boom-in-identity">Shifting Left of Boom in Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Our Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Our Recent Training Academy Episodes</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Our Recent Deep Dive Vendor Assessment Reports</strong></h3><div id="youtube2-kljV2wFwSAw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kljV2wFwSAw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kljV2wFwSAw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Recent Vendor Introduction Interviews</strong></h3><p>What are digital employees? How can they help with the identity and access management ticket workload? An interview with Twine Security to find out more&#8230;</p><div id="youtube2-voMfdd4ldZ4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;voMfdd4ldZ4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/voMfdd4ldZ4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Our Recent Video Shorts</strong></h3><div id="youtube2-Xk4w35ar1_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Xk4w35ar1_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Xk4w35ar1_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-ae-qa4YBYbo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ae-qa4YBYbo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ae-qa4YBYbo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-p8nYyvRmHb4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;p8nYyvRmHb4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/p8nYyvRmHb4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Silverfort]]></title><description><![CDATA[Vendor Report]]></description><link>https://radar.thecyberhut.com/p/silverfort</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/silverfort</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Mon, 09 Feb 2026 11:39:14 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a6e8e369-4015-4784-9788-3d5954c54114_997x574.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>What They Do</strong></h2><h3><strong>Capability Matrix Entry</strong></h3><p><strong>Web URL: </strong>https://www.silverfort.com/</p><p><strong>Identity Type: </strong>B2E, NHI</p><p><strong>Stakeholder Engagement: </strong>CIO, CISO, IAM, SoC</p><p><strong>Tags: </strong>authentication, privileged access, identity data, runtime, detection, response, itdr, hygiene, behaviour, intent, attribution, risk, on-premises</p><p><strong>Description: </strong><em><strong>&#8220;</strong>Discover and protect every dimension of identity, everywhere. Human, machine or AI, cloud or on-prem&#8212;including systems that couldn&#8217;t be protected before.&#8221;</em></p><p>NB - Download the full market capability matrix <a href="https://www.thecyberhut.com/vendor-map/">here</a>.</p><p>Silverfort provides a Unified Identity Security Platform that acts as an agentless overlay on your existing Identity and Access Management (IAM) infrastructure.</p><p>Its primary function is to secure all user and service account access across your entire environment&#8212;both on-premises (legacy) and cloud&#8212;by enforcing modern security controls.</p>
      <p>
          <a href="https://radar.thecyberhut.com/p/silverfort">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cheat Sheet: Application Governance]]></title><description><![CDATA[Accelerating the expansion of IGA Infrastructure]]></description><link>https://radar.thecyberhut.com/p/cheat-sheet-application-governance</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/cheat-sheet-application-governance</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 06 Feb 2026 10:09:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The What</h2><p>Application governance (and administration) (AGA), is a specialized - yet rising - domain within Identity Governance and Administration (IGA) focused on managing the <strong>full lifecycle of access, permissions, and compliance for applications. </strong>These apps are typically those involving high-risk factors like privileged access, non-human identities, or shadow IT.</p><p>The key end goal design principles include:</p><ul><li><p><strong>Zero Standing Privilege (ZSP):</strong> A strategic migration where no identity or account has pre-provisioned permissions or credentials when not in use, thereby reducing the identity attack surface.</p></li><li><p><strong>Just-in-Time (JiT) Access:</strong> Permissions and credentials are associated only when a verified, validated, and approved event or task is being processed.</p></li><li><p><strong>Automation:</strong> Essential for integrating more identities, systems, and locations, which includes automating discovery, provisioning, de-provisioning, and credential rotation.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P0RZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P0RZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 424w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 848w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 1272w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P0RZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png" width="959" height="658" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/de1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:658,&quot;width&quot;:959,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178786,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/187004317?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P0RZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 424w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 848w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 1272w, https://substackcdn.com/image/fetch/$s_!P0RZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fde1e4343-db88-4fc8-8fa3-6e2fda041f92_959x658.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Why</h2><p>Two sub-problems have emerged with respect to successfully deploying concepts like ZSP, JiT and least-privilege as part of a broader identity security fabric and zero trust initiative.</p><p>Firstly the existing identity and access management (IAM) pillars being used to handle the B2E workforce life cycle management use cases are often silo&#8217;d.  This results in visibility blind spots, overlapping capabilities and ineffective security controls assurance.</p><p>The second aspect, is that specifically within the IGA world, the coverage of the core IGA platforms is low. They typically focus upon the most high risk applications - or applications that fall under regulatory scrutiny. This could be less than 10% of the overall application landscape. The remaining applications are either managed manually using ticketing systems or are entirely un-managed. The un-managed list will also include shadow-apps - that organisations don&#8217;t even know are un-managed.</p><p>To that end several issues develop:</p><ol><li><p>Organisations want to improve basic IGA coverage to more (if not all apps)</p></li><li><p>Un-managed and shadow-app risk management is not complete</p></li><li><p>Visibility and usage within applications is not known</p></li><li><p>Access request and review processes are incomplete, ineffective and costly</p></li></ol><h2>Considerations</h2><ol><li><p>Is the existing IGA components (software or manual) being measured?</p></li><li><p>Is the current IGA model working effectively?</p></li><li><p>What is hindering expansion of the core IGA capabilities to more systems?</p></li><li><p>Do you have IGA capabilities for all identity types including NHI, agentic and workloads?</p></li></ol><h2>Example Capabilities</h2><ol><li><p>Discovery of shadow applications</p></li><li><p>Analysis of un-managed applications</p></li><li><p>Accelerated on-boarding of applications into the core IGA function</p></li><li><p>Visibility of account usage <strong>within</strong> applications</p></li><li><p>Support for human and non-human accounts</p></li><li><p>Composite risk analysis of application configuration</p></li><li><p>Composite risk analysis of application account usage</p></li><li><p>Template and semi-autonomous connectivity</p></li><li><p>Access path analytics</p></li><li><p>Permission usage analytics</p></li><li><p>Access request contextual analysis - E.g SoD, compliance validation</p></li></ol><div><hr></div><h2>Vendor Solutions</h2><h3><a href="https://nexis-secure.com/en/">Nexis</a></h3><p>Offering a solution for &#8220;Enterprise Authorization Governance&#8221;.</p><p><strong>Core Capabilities:</strong></p><ul><li><p><strong>Authorization Governance:</strong> Helps organizations manage and structure authorizations, ensuring they undergo lifecycle processes and comply with regulations (like SoD, least privilege).</p></li><li><p><strong>Overlay for Existing IGA:</strong> It acts as an overlay to enhance existing IGA systems (e.g., SailPoint, One Identity, IBM, Oracle, MS Entra ID) for improved functionality and efficiency.</p></li><li><p><strong>Role Management:</strong> It features role mining, fine-grained analysis, risk-based RBAC, and streamlined role lifecycle management (creating, changing, deleting Business Roles).</p></li><li><p><strong>Workflow Automation:</strong> It uses an easy-to-use, no-code workflow engine for seamless implementation of IGA use cases and automating Joiner-Mover-Leaver (JML) processes.</p></li><li><p><strong>Authorization Concept Management:</strong> Its module provides an integrated, automated solution for creating, maintaining, and versioning audit-proof authorization concepts, overcoming the limitations of static documents (like Word/Excel).</p></li><li><p><strong>AI Integration:</strong> Includes an Intelligent Assistant (NICO) to guide users through recertification, and AI-driven features for role model discovery, optimization, and anomaly detection.</p></li><li><p><strong>User Experience:</strong> It&#8217;s designed for end-users, providing tailor-made, web-based interfaces and self-service portals.</p></li></ul><p><strong>Solution Scenarios:</strong></p><ul><li><p><strong>Compliance:</strong> Simplifying challenges around regulatory compliance, Segregation of Duties (SoD), and recertifications.</p></li><li><p><strong>Modernize Legacy IGA:</strong> Enhancing functionality and efficiency of deeply integrated legacy IGA systems, particularly around user experience and self-service.</p></li><li><p><strong>IGA Light:</strong> Offering smart Identity Governance for Small to Midsize Businesses (SMBs) without existing IGA solutions.</p></li><li><p><strong>Authorization Governance for Microsoft Entra ID:</strong> Enhancing compliance and governance for organizations using Microsoft Entra ID.</p></li></ul><div><hr></div><h3><a href="https://www.orchid.security/">Orchid Security</a></h3><p><strong>Core Capabilities:</strong></p><ul><li><p><strong>Application Discovery and Inventory Management:</strong> Their initial customer landing point is application inventory, focused on finding and identifying un-managed, self-hosted, or previously unknown applications.</p></li><li><p><strong>Application Governance:</strong> Helping organizations govern their applications, especially after they are discovered.</p></li><li><p><strong>Identity and Access Analysis:</strong> They provide insights into:</p><ul><li><p>Authentication flows and access paths.</p></li><li><p>Routes, authentication methods, and access happening within the applications.</p></li><li><p>The difference between Identity Governance and Administration (IGA) and activity via traceability.</p></li></ul></li><li><p><strong>Risk Analysis and Compliance:</strong></p><ul><li><p>Applications are presented via a risk analysis dashboard.</p></li><li><p>They provide out-of-the-box templates, scans, and recommendations for compliance frameworks such as <strong>ISO 27001</strong>, <strong>NIST 800-53</strong>, <strong>PCI DSS</strong>, <strong>SOC 2 Type 2</strong>, <strong>GDPR</strong>, <strong>HIPAA</strong>, and <strong>SOX</strong>.</p></li></ul></li><li><p><strong>Augmentation and Remediation:</strong> They can &#8220;augment and raise the security level&#8221; if an issue is found, particularly for legacy applications that cannot be changed, supporting inline remediation.</p></li></ul><p><strong>Solution Scenarios:</strong></p><ul><li><p><strong>Mergers &amp; Acquisitions (M&amp;A):</strong> Providing due diligence, risk analysis, and counter measures during app integration.</p></li><li><p><strong>Audit Failings and GRC Concerns:</strong> Addressing audit findings and Governance, Risk, and Compliance issues.</p></li><li><p><strong>IGA Expansion and Onboarding Acceleration:</strong> Speeding up the integration of disconnected applications.</p></li><li><p><strong>Understanding Out-of-Band Authentication Flows.</strong></p></li></ul><div><hr></div><h3><a href="https://readibots.com/">Readibots</a></h3><p><strong>Core Capabilities:</strong></p><p>Readibots provides a platform focused on <strong>Identity Data Automation</strong> to streamline and accelerate Identity Governance and Administration (IGA) processes. They position their product as an <strong>IAM Hub</strong> built to remove manual effort and complexity from identity flows.</p><ul><li><p><strong>Focus on Automation:</strong> Core offering is the <strong>READI platform</strong>, which focuses on automating identity data flows. This is presented as an alternative to traditional connectivity or workflow engines, aiming to solve the complexity and workflow issues commonly associated with IGA.</p></li><li><p><strong>IAM Hub:</strong> The platform acts as an &#8220;IAM Hub&#8221; that connects to existing systems to improve the flow and transformation of identity data.</p></li><li><p><strong>Data Management:</strong> They offer inline data analysis and transformation capabilities, including a feature called <strong>&#8220;Atlas,&#8221;</strong> which serves as a meta-directory or virtual directory.</p></li></ul><p><strong>Solution Scenarios:</strong></p><ul><li><p><strong>Addressing IGA Pain Points:</strong> They specifically target &#8220;IGA projects in distress&#8221; and enterprises that lack the ability to create complex connectors or workflows.</p></li><li><p><strong>Productivity and Efficiency:</strong> Aiming to remove the human element in identity flows and serving as a productive driver.</p></li><li><p><strong>Speed and Agility:</strong> Offering faster deployments and an adaptive platform that does not require changing existing processes.</p></li></ul><div><hr></div><h3><a href="https://www.stackbob.ai/">StackBob</a></h3><p><strong>Core Capabilities:</strong></p><p>Stackbob's primary focus is on <strong>IAM-infrastructure optimization</strong> and <strong>Identity Governance and Administration (IGA)</strong>. Their solution implements alongside and augments existing IGA/IdP systems (like Sailpoint, MS Entra, and Ping), rather than replacing them.</p><ul><li><p><strong>Extending Governance to Any App:</strong> They specialize in bringing applications that lack standard connectors (SCIM or APIs) into the identity workflow, offering a &#8220;No API required&#8221; and &#8220;No-Code setup&#8221; approach.</p></li><li><p><strong>Automating Identity Lifecycle:</strong> They help IT Admins and Department Managers streamline the <strong>joiner, mover, and leaver</strong> process (on/offboarding) and manage <strong>Role-Based Access Control (RBAC)</strong> for employees and contractors.</p></li><li><p><strong>Cutting License Waste:</strong> The platform helps Finance teams detect and remove unused licenses and orphaned accounts to reduce software costs. </p></li><li><p><strong>Streamlining Security Compliance:</strong> They help businesses achieve audit-ready compliance evidence quickly for audits like <strong>SOC 2 and ISO 27001</strong>.</p></li><li><p><strong>Agentic Approach:</strong> The company is moving to an &#8220;agentic and ultimately autonomous approach&#8221; to enhance workflows and manual fulfillment processes, as noted in your meeting files.</p></li></ul><p><strong>Solution Scenarios:</strong></p><ul><li><p><strong>Automating Provisioning for Non-Integrated Apps (Joiner/Mover/Leaver)</strong></p><ul><li><p>Stackbob&#8217;s agentic technology can interact with the app&#8217;s user interface or other less-conventional interfaces to automate the provisioning and de-provisioning process.</p></li></ul></li><li><p><strong>Reducing Unused/Orphaned Software Licenses</strong></p><ul><li><p>The platform aggregates usage data and cost information across <em>all</em> managed apps to identify licenses that have low or no recent activity. It can then automate the process of either downgrading or deactivating these unused licenses, allowing teams to quickly realize savings and reduce <strong>license waste</strong>.</p></li></ul></li><li><p><strong>Achieving Audit-Ready Compliance for All Apps</strong></p><ul><li><p>Stackbob centralizes the access data for all applications, even those without APIs, providing a single source of truth for all users and their permissions. This makes it possible to quickly generate the comprehensive reports and evidence needed to pass audits, proving that <strong>Identity Governance and Administration (IGA)</strong> principles are applied</p></li></ul></li></ul><div><hr></div><h3><a href="https://pathlock.com/">Pathlock</a></h3><p><strong>Core Capabilities:</strong></p><p>Pathlock's core capabilities are centered around a comprehensive <strong>Identity and Application Access Governance (AAG)</strong> suite, specifically designed for fine-grained security and compliance in business-critical applications, particularly ERP systems. The solution is built on the vision of <strong>Continuous Access Governance for the Connected Enterprise.</strong></p><ul><li><p><strong>Access Risk Analysis (ARA):</strong> Analyzes access risk for Segregation of Duties (SoD), Sensitive Access, and Critical Access in a single view.</p></li><li><p><strong>Compliant Provisioning:</strong> Automates access provisioning with risk scoring and policy-based workflows.</p></li><li><p><strong>Certifications:</strong> Facilitates the review of user access, roles, risks, and controls across all business applications.</p></li><li><p><strong>Role Management:</strong> Helps build compliant technical and business roles with risk simulation analysis.</p></li><li><p><strong>Elevated Access Management (EAM):</strong> Monitors privileged users, enforces controls, collects logs, and automates the review of high-risk activity.</p></li><li><p><strong>Continuous Controls Monitoring:</strong> Provides real-time visibility into access, risk, and control events, moving from transaction-based to risk-based audit.</p></li><li><p><strong>Cybersecurity Application Controls:</strong> Includes vulnerability management, threat detection and response, dynamic access controls, code scanning, and transport control.</p></li><li><p><strong>Fine-Grained Entitlement Granularity:</strong> The platform provides a unique competency to perform fine-grained access risk management for multiple applications (e.g., SAP, Oracle EBS), going deeper than the coarse-grained entitlements of traditional IGA tools.</p></li></ul><p><strong>Solution Scenarios:</strong></p><ul><li><p><strong>Replacing and Augmenting Legacy IGA and GRC Tools</strong></p><ul><li><p><strong>Augment Existing IGA:</strong> Integrate with solutions like <strong>SailPoint</strong> and <strong>Microsoft Entra ID</strong> to provide the fine-grained Access Risk Analysis (ARA) for critical systems, enhancing their provisioning and certification workflows.</p></li><li><p><strong>Replace Legacy Systems:</strong> Directly replace older systems by offering full Pathlock Cloud, more Out-of-the-Box (OOTB) rules, and superior multi-app capabilities (e.g., better Firefighter for emergency access).</p></li></ul></li><li><p><strong>Continuous Compliance and Audit Automation</strong></p><ul><li><p><strong>Automate Controls Testing &amp; Ensure Audit Readiness:</strong> Provide continuous, real-time evidence and centralized, standardized monitoring of all Segregation of Duties (SoD) risks across environments (SAP, JD Edwards, Ariba).</p></li><li><p><strong>AI-Driven Audit:</strong> Future capabilities include &#8220;AI-generated documentation and audit evidence&#8221; and a &#8220;Chat with Your Auditor&#8221; explainable AI interface to streamline audit responses.</p></li></ul></li><li><p><strong>Fine-Grained Access Risk Management for Business-Critical ERPs</strong></p><ul><li><p><strong>Visibility into Transaction-Level Activity:</strong> Captures granular, security-relevant user activity (page, field, transaction level) inside applications like PeopleSoft to see <em>what a user is actually doing</em> versus <em>what they are provisioned to do</em>.</p></li><li><p><strong>Detailed Entitlement Granularity:</strong> For systems like Oracle EBS, Pathlock goes beyond simple roles to manage access across &#8220;App Specific Responsibilities,&#8221; &#8220;Functions Only with Prompt,&#8221; and &#8220;Consider ReadOnly Functions&#8221; to deliver precise risk reporting.</p></li><li><p><strong>Non-Human Identity (NHI) Governance:</strong> Provides end-to-end governance for service accounts and agentic AI agents within ERPs, including request, provisioning, monitoring, and certification.</p></li></ul></li></ul><div><hr></div><h3><a href="https://www.zluri.com/">Zluri</a></h3><p><strong>Core Capabilities:</strong></p><p>The Zluri platform is centered around its <strong>Next-Gen Identity Governance and Administration (IGA)</strong> approach, often described using the <strong>Visibility, Intelligence, Action (VIA)</strong> Model.</p><p><strong>Visibility (SaaS Management &amp; Discovery)</strong></p><ul><li><p><strong>Comprehensive Application Visibility:</strong> Discovers and tracks all applications in use, including federated, unfederated, and <strong>Shadow IT</strong> apps.</p></li><li><p><strong>Real-Time Usage Data:</strong> Moves beyond static identity attributes by integrating dynamic application activity data, crucial for optimization and risk analysis.</p></li><li><p><strong>Gen AI Discovery:</strong> Identifies and auto-classifies Generative AI (GenAI) apps like ChatGPT and Claude in use across the organization.</p></li></ul><p><strong>Intelligence (Analytics &amp; Reporting)</strong></p><ul><li><p><strong>Zluri IRIS (Identity Risk Intelligence System):</strong> Provides interactive dashboards, pre-built widgets, and scheduled reports to track identity governance metrics, risk posture, and license utilization.</p></li><li><p><strong>App Access &amp; Activity Intelligence:</strong> Highlights insights such as unauthorized apps in use, over-provisioned access (e.g., users with admin access who don&#8217;t use it), and unused licenses.</p></li><li><p><strong>License Optimization:</strong> Performs usage analysis to identify unused licenses and redundant applications, leading to significant cost savings.</p></li></ul><p><strong>Action (Automation &amp; Governance)</strong></p><ul><li><p><strong>Identity Lifecycle Management:</strong> Provides <strong>Instant Onboarding and Offboarding</strong> by bridging the HR-IT gap, using centralized playbooks to automate provisioning and deprovisioning actions across various systems (e.g., Okta, GitHub, Microsoft 365).</p></li><li><p><strong>Access Reviews/Certifications:</strong> Simplifies audits (SOC 2, ISO 27001) with automated, evidence-based certification, where reviewer decisions are supported by actual usage data.</p></li><li><p><strong>Entitlement Management &amp; Least Privilege:</strong> Offers a centralized view of roles and permissions to support accurate review decisions and continuously rightsize permissions to reduce access sprawl.</p></li><li><p><strong>Security &amp; Compliance:</strong> Enables automated actions and alerts on policy violations and provides audit-ready reports.</p></li></ul><p><strong>Solution Scenarios:</strong></p><p><strong>Automated Onboarding and Offboarding (Identity Lifecycle Management)</strong></p><ul><li><p>Zluri automatically triggers a pre-configured <strong>workflow/playbook</strong> based on the HR system update (e.g., Workday or HiBob). It instantly provisions or deprovisions access across all required applications (like Okta, GitHub, Microsoft 365, Slack, etc.)</p></li></ul><p><strong>Evidence-Based Access Reviews and Compliance</strong></p><ul><li><p>Automates the process by initiating a certification campaign (e.g., &#8220;SOX ITGC Q2&#8221;). It provides reviewers with <strong>real-time usage and activity data</strong> for each user and entitlement. This &#8220;evidence-based certification&#8221; helps reviewers make accurate decisions. </p></li></ul><p><strong>SaaS Cost Optimization and Shadow IT Remediation</strong></p><ul><li><p><strong>Patented Discovery Engine</strong> provides complete visibility into all 1400+ applications in use (<strong>Shadow IT</strong> included). It identifies <strong>&#8220;dormant&#8221;</strong> or <strong>&#8220;inactive licensed users&#8221;</strong> who are still paying for a license but haven&#8217;t used the app in a set time (e.g., 90 days).</p></li></ul><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Semperis + MightyID, Strata + CSA AI Report, Teleport Agentic Framework]]></title><description><![CDATA[Strategic & Emerging Headlines]]></description><link>https://radar.thecyberhut.com/p/semperis-mightyid-strata-csa-ai-report</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/semperis-mightyid-strata-csa-ai-report</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 05 Feb 2026 11:12:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h3>Curated Industry Announcements</h3><ul><li><p><strong>1Kosmos</strong>: <a href="https://www.1kosmos.com/resources/press-center/1kosmos-announces-integration-partnership-with-fischer-identity?utm_source=radar.thecyberhut.com">1Kosmos Announces Integration Partnership with Fischer Identity</a></p></li><li><p><strong>AuthSignal</strong>: <a href="https://www.authsignal.com/blog/articles/how-to-deploy-passkeys-that-drive-real-adoption-insights-from-yubico-and-authsignal?utm_source=radar.thecyberhut.com">How to deploy passkeys that drive real adoption: Insights from Yubico and Authsignal</a></p></li><li><p><strong>Google</strong>: <a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-5-top-ciso-priorities-in-2026/?utm_source=radar.thecyberhut.com">Cloud CISO Perspectives: 5 top CISO priorities in 2026</a></p></li><li><p><strong>Semperis:</strong> <a href="https://www.semperis.com/blog/semperis-acquires-mightyid-expands-true-cyber-resilience-across-okta-ping?utm_source=radar.thecyberhut.com">Acquires MightyID: Expands True Cyber Resilience Across Multi-IdP Environments</a></p></li><li><p><strong>Strata Identity</strong>: <a href="https://www.strata.io/resources/news/new-survey-from-cloud-security-alliance-strata-identity-finds-that-enterprises-are-in-a-time-to-trust-phase/?utm_source=radar.thecyberhut.com">New Survey from Cloud Security Alliance, Strata Identity Finds That Enterprises Are in a &#8220;Time-to-Trust&#8221; Phase, As They Build Foundations for AI Autonomy</a></p></li><li><p><strong>Teleport</strong>: <a href="https://goteleport.com/blog/ai-agentic-identity-framework/?utm_source=radar.thecyberhut.com">AI Infrastructure Needs an Agentic Identity Framework &#8212; We&#8217;re Building It</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://castilho.sh/salesforce-oauth-ato?utm_source=radar.thecyberhut.com">Stealing Salesforce OAuth Tokens using the WA</a></p></li><li><p><a href="https://permiso.io/blog/inside-the-openclaw-ecosystem-ai-agents-with-privileged-credentials?utm_source=radar.thecyberhut.com">Inside the OpenClaw Ecosystem: What Happens When AI Agents Get Credentials to Everything</a></p></li><li><p><a href="https://cloud.google.com/blog/topics/threat-intelligence/expansion-shinyhunters-saas-data-theft?utm_source=radar.thecyberhut.com">Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft</a></p></li><li><p><a href="https://www.cloud-architekt.net/token-hunting-workload-identity-activity/?utm_source=radar.thecyberhut.com">Analyzing Workload Identity Activity Through Token-Based Hunting</a></p></li><li><p><a href="https://www.silverfort.com/blog/moltbot-when-your-identity-keeps-working-after-you-do/?utm_source=radar.thecyberhut.com">Moltbot: When your identity keeps working after you do</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-agentic-ai-identity-security">Agentic-AI Identity Security</a></p></li></ul><div><hr></div><h2>Identity Security Vendor Summary Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hydden">Hydden</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" width="991" height="998" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:998,&quot;width&quot;:991,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178126,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/183535050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Content Updates</h2><h3>Improving the MTTA</h3><ul><li><p>A deep dive into the concept of improving the mean time to access for a range of different stakeholders to a broad array of high risk systems</p></li></ul><div id="youtube2-U7Xiz_8NZww" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;U7Xiz_8NZww&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/U7Xiz_8NZww?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Most Recent Industry Webinar</strong></h3><ul><li><p><strong>3 December</strong> - Modernizing AD Protection Against Lateral Movement and Privileged Access Abuse with Silverfort</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bkkd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/180490079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration"><span>Reserve Your Seat</span></a></p><div><hr></div><h3>Our Recent Podcast Episodes</h3><ul><li><p>E68 The Analyst Brief: Delinea and StrongDM, PAM and AI&#8230;</p><div id="youtube2-hAEcJvvVcUA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;hAEcJvvVcUA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/hAEcJvvVcUA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Our Recent Research Reports:</strong></h3><ul><li><p>The Cyber Hut: <a href="https://www.radiantlogic.com/display/the-cyber-hut-a-market-guide-to-ispm-the-role-of-data-centric-identity-observability/?utm_source=radar.thecyberhut.com">A Market Guide to Identity Security Posture Management (ISPM): The Role of Data-Centric Identity Observability</a></p></li></ul><div id="youtube2-lpaU3tWrz84" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;lpaU3tWrz84&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/lpaU3tWrz84?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Recent Comments and Analyst Insight</strong></h3><ul><li><p>The Identity Underground 2026 Pulse: <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li><li><p><a href="https://www.p0.dev/blog/why-pam-needs-to-evolve?utm_source=radar.thecyberhut.com">Why PAM Needs to Evolve</a></p></li><li><p><a href="https://www.reveal.security/blog/shifting-left-of-boom-in-identity">Shifting Left of Boom in Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Our Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Our Recent Training Academy Episodes</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Our Recent Deep Dive Vendor Assessment Reports</strong></h3><div id="youtube2-kljV2wFwSAw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kljV2wFwSAw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kljV2wFwSAw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Recent Vendor Introduction Interviews</strong></h3><p>What are digital employees? How can they help with the identity and access management ticket workload? An interview with Twine Security to find out more&#8230;</p><div id="youtube2-voMfdd4ldZ4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;voMfdd4ldZ4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/voMfdd4ldZ4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Our Recent Video Shorts</strong></h3><div id="youtube2-2nw9UIPQS20" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2nw9UIPQS20&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2nw9UIPQS20?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-iB8zAaRhjKQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;iB8zAaRhjKQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/iB8zAaRhjKQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-2ykFojaxjeI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2ykFojaxjeI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2ykFojaxjeI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-9WTdvcXawo0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;9WTdvcXawo0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/9WTdvcXawo0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Ory + HID, CrowdStrike + Natoma, Descope AI Hub]]></title><description><![CDATA[Strategic & Emerging Headlines]]></description><link>https://radar.thecyberhut.com/p/ory-hid-crowdstrike-natoma-descope</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/ory-hid-crowdstrike-natoma-descope</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 27 Jan 2026 11:08:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h3>Curated Industry Announcements</h3><ul><li><p><strong>AWS</strong>: <a href="https://aws.amazon.com/blogs/security/exploring-common-centralized-and-decentralized-approaches-to-secrets-management/?utm_source=radar.thecyberhut.com">Exploring common centralized and decentralized approaches to secrets management</a></p></li><li><p><strong>Beyond</strong> <strong>Identity</strong>: <a href="https://www.beyondidentity.com/resource/beyond-identity-opens-early-access-for-the-ai-security-suite?utm_source=radar.thecyberhut.com">Opens Early Access for the AI Security Suite</a></p></li><li><p><strong>Cisco</strong>: <a href="https://blogs.cisco.com/security/privacy-data-governance-innovation-trust?utm_sourc=radar.thecyberhut.com">Privacy and Data Governance &#8212; Keys to Innovation and Trust in the AI Era</a></p></li><li><p><strong>Descope</strong>: <a href="https://www.globenewswire.com/news-release/2026/01/26/3225766/0/en/Descope-Unveils-Agentic-Identity-Hub-2-0-the-Most-Comprehensive-Identity-Platform-for-AI-Agents-and-MCP-Servers.html">Unveils Agentic Identity Hub 2.0, the Most Comprehensive Identity Platform for AI Agents and MCP Servers</a></p></li><li><p><strong>Natoma</strong>: <a href="https://marketplace.crowdstrike.com/listings/natoma-agent-access-for-crowdstrike-falcon/?utm_source=radar.thecyberhut.com">Announce partnership with CrowdStrike</a></p></li><li><p><strong>Ory</strong>: <a href="https://www.ory.com/blog/partnership-announcement-hid?utm_source=radar.thecyberhut.com">Partners with HID to Deliver First Enterprise FIDO2 Identity Platform of the Converged Physical and Digital Era</a></p></li><li><p><strong>RSA Security</strong>: <a href="https://www.rsa.com/news/press-releases/rsa-group-announces-new-135-million-capital-infusion-and-debt-refinancing-to-accelerate-ai-product-innovation-and-organic-growth/?utm_source=utm_source=radar.thecyberhut.com">Announces New $135 Million Capital Infusion and Debt Refinancing to Accelerate AI Product Innovation and Organic Growth</a></p></li><li><p><strong>Transmit Security</strong>: <a href="https://transmitsecurity.com/blog/the-2025-mosaic-rewind-how-ai-standards-and-smarter-defenses-shaped-identity-security?utm_source=radar.thecyberhut.com">The 2025 Mosaic Rewind: How AI, Standards and Smarter Defenses Shaped Identity Security</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://www.cloud-architekt.net/linking-privileged-accounts-in-defender/?utm_source=radar.thecyberhut.com">Linking Privileged Accounts to Identities in Microsoft Defender: Benefits &amp; Use Cases</a></p></li><li><p><a href="https://www.praetorian.com/blog/as-strong-as-your-weakest-parameter-an-ai-authorization-bypass/?utm_source=radar.thecyberhut.com">As Strong As Your Weakest Parameter: An AI Authorization Bypass</a></p></li><li><p>Understanding DocuSign Credential Harvesting Campaigns: <a href="https://nehagthm.medium.com/understanding-docusign-credential-harvesting-campaigns-a-case-study-5c7495e45c95">A Case Study</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-agentic-ai-identity-security">Agentic-AI Identity Security</a></p></li></ul><div><hr></div><h2>Identity Security Vendor Summary Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/cyberark">CyberArk</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hydden">Hydden</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" width="991" height="998" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:998,&quot;width&quot;:991,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178126,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/183535050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Content Updates</h2><h3>Improving the MTTA</h3><ul><li><p>A deep dive into the concept of improving the mean time to access for a range of different stakeholders to a broad array of high risk systems</p></li></ul><div id="youtube2-U7Xiz_8NZww" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;U7Xiz_8NZww&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/U7Xiz_8NZww?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Most Recent Industry Webinar</strong></h3><ul><li><p><strong>3 December</strong> - Modernizing AD Protection Against Lateral Movement and Privileged Access Abuse with Silverfort</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bkkd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/180490079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration"><span>Reserve Your Seat</span></a></p><div><hr></div><h3>Our Recent Podcast Episodes</h3><ul><li><p>E67 The Analyst Brief: End of 2026 Acquisitions and Technology Consolidation</p></li></ul><div id="youtube2-Ym4x8qq7v2Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ym4x8qq7v2Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ym4x8qq7v2Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Our Recent Research Reports:</strong></h3><ul><li><p>The Cyber Hut: <a href="https://www.radiantlogic.com/display/the-cyber-hut-a-market-guide-to-ispm-the-role-of-data-centric-identity-observability/?utm_source=radar.thecyberhut.com">A Market Guide to Identity Security Posture Management (ISPM): The Role of Data-Centric Identity Observability</a></p></li></ul><div id="youtube2-lpaU3tWrz84" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;lpaU3tWrz84&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/lpaU3tWrz84?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Recent Comments and Analyst Insight</strong></h3><ul><li><p>The Identity Underground 2026 Pulse: <a href="https://www.theidentityunderground.com/annual-pulse-2026">&#8220;From Operations to Strategic Enabler: Why IAM Must Adapt&#8221;</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li><li><p><a href="https://www.p0.dev/blog/why-pam-needs-to-evolve?utm_source=radar.thecyberhut.com">Why PAM Needs to Evolve</a></p></li><li><p><a href="https://www.reveal.security/blog/shifting-left-of-boom-in-identity">Shifting Left of Boom in Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Our Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Our Recent Training Academy Episodes</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Our Recent Deep Dive Vendor Assessment Reports</strong></h3><div id="youtube2-kljV2wFwSAw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kljV2wFwSAw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kljV2wFwSAw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Our Recent Vendor Introduction Interviews</strong></h3><div id="youtube2-voMfdd4ldZ4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;voMfdd4ldZ4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/voMfdd4ldZ4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Our Recent Video Shorts</strong></h3><div id="youtube2-2nw9UIPQS20" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2nw9UIPQS20&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2nw9UIPQS20?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-hwayO1XKrPs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;hwayO1XKrPs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/hwayO1XKrPs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-vSlrpcSI99s" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;vSlrpcSI99s&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/vSlrpcSI99s?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-kCfxhuymaCs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kCfxhuymaCs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kCfxhuymaCs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[CyberArk]]></title><description><![CDATA[Vendor Report]]></description><link>https://radar.thecyberhut.com/p/cyberark</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/cyberark</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Mon, 26 Jan 2026 15:41:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ee800dd4-5fb7-4710-8753-8ec9916757c0_1381x694.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>What They Do</h2><h3>Capability Matrix Entry</h3><p><strong>Web URL:  </strong>https://www.cyberark.com/</p><p><strong>Identity Type: </strong>B2E, NHI</p><p><strong>Stakeholder Engagement: </strong>CISO, CIO, Developer</p><p><strong>Tags: </strong>infrastructure, application, JiT, on-premises, policy, privileged access, secrets, browser, ZSP, iga</p><p><strong>Description: </strong><em><strong>&#8220;</strong>Seamlessly secure identities throughout the cycle of accessing any resource across any infrastructure, including hybrid, SaaS and multi-cloud. The CyberArk identity security platform is the first line of defense against malicious actors and unauthorized access to protect what matters most.&#8221;</em></p><p><strong>CyberArk is the leading Identity Security provider</strong> that helps organizations secure all forms of digital access to critical business data and infrastructure.</p><p>Their core mission, built on a foundation of intelligent privilege controls, is to protect against the leading causes of breaches: compromised human and machine identities and credentials.</p><p>CyberArk achieves this through a unified <strong>Identity Security Platform</strong> that covers several key areas:</p>
      <p>
          <a href="https://radar.thecyberhut.com/p/cyberark">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Delinea + StrongDM, AuthSignal Palm-auth, Agentic least priv]]></title><description><![CDATA[Strategic & Emerging Headlines]]></description><link>https://radar.thecyberhut.com/p/delinea-strongdm-authsignal-palm</link><guid isPermaLink="false">https://radar.thecyberhut.com/p/delinea-strongdm-authsignal-palm</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 20 Jan 2026 11:23:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Strategic &amp; Emerging Headlines</h2><h4>Delinea to acquire StrongDM</h4><p>Hot on the back of CrowdStrike <a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">announcing they are to acquire</a> SGNL, privileged access provider and more latterly AI-driven platform provider <a href="https://delinea.com/">Delinea</a> announced they are to acquire <a href="https://www.strongdm.com/">StrongDM</a>.</p><p>Delinea (who rebranded from <a href="https://delinea.com/blog/thycoticcentrify">Thycotic after they acquired Centrify)</a> has traditionally been focused on the privileged space, competing with the likes of CyberArk and BeyondTrust.  With over 1200 employees (according to LinkedIn) and several other recent IAM related acquisitions, they are building out a strategic platform capable of delivering a range of human, non-human, privileged and now it seems authorization related use cases.</p><p>Delinea describe themselves today as:</p><blockquote><p>&#8220;Delinea made Privileged Access Management (PAM) seamless. But today&#8217;s enterprises need more than just PAM. They need identity controls that are intelligent, adaptive, and measurable. Powered by Delinea Iris AI, our platform delivers centralized, risk-based authorization to discover, monitor, govern, and secure all identities.</p></blockquote><p>Their other recent related acquisitions include:</p><ul><li><p><a href="https://delinea.com/blog/delinea-acquires-authomize-detect-mitigate-identity-threats">Jan 2024 ITDR Provider Authomize</a></p></li><li><p><a href="https://delinea.com/news/delinea-completes-acquisition-of-fastpath-modernize-identity-security">April 2024 IGA Provider Fastpath</a></p></li></ul><p>So how does StrongDM fit in here? They describe themselves as:</p><blockquote><p>&#8220;Control what happens after login. Authorization at runtime. Productivity in real time. StrongDM gives you the control PAM promised but never delivered. Enforce policy in real time, eliminate passwords, and meet developers where they are.&#8221;</p></blockquote><p>Their platform delivers an access-analyse-govern set of capabilities, with the emphasis on a workstation client, gateway enforcer and central control plane. Protected resources seem typically to be in the infrastructure asset space, with a consistent zero-trust narrative for continuous and seamless access.</p><p>So what will this mean for Delinea prospects and customers and the wider identity security sector?</p><p>The Delinea <a href="https://delinea.com/news/delinea-strongdm-to-unite-redefine-identity-security-for-the-ai-era">press release</a> gives a few insights. The initial paragraph sets the scene by instantly distancing Delinea from their PAM roots and places StrongDM in the just-in-time (JiT) authorization space:</p><blockquote><p>&#8220;<a href="https://www.delinea.com/">Delinea</a>, a pioneering provider of solutions for securing human and machine identities through centralized authorization, today announced it has signed a definitive agreement to acquire StrongDM, the universal access management company purpose-built for modern engineering, DevOps, and AI-driven environments. Delinea&#8217;s leadership in enterprise privileged access management (PAM), combined with StrongDM&#8217;s just-in-time (JIT) runtime authorization capabilities and developer-first access model, will form a new class of identity security platform designed for continuous, always-on environments.&#8221;</p></blockquote><p>So here we start to see a more unified platform story - Delinea catering for both people and non-humans (including agents) with StrongDM playing the card of being a &#8220;universal access management&#8221; player - which supports a broader set of stakeholders including the ever-under-pressure DevOps.</p><p>This positions Delinea to be a more protect &#8220;anything, anywhere&#8221; platform - be that humans, non-humans or agents (all of whom by design will need the use of privileged permissions) wanting to gain access to a much broader array of resources - from code to infrastructure.</p><p>The rise of AI adoption has increased the need for improved automation and JiT in ways in which <strong>both</strong> credentials and in turn permissions are assigned and removed.</p><p>So what does the combined machine let organisations achieve?</p><blockquote><p>&#8220;The combination of Delinea and StrongDM reflects the evolution of traditional session-based PAM into a scalable, modern identity security control plane that governs privileged access across all human and NHIs through JIT runtime authorization. This approach enables continuous evaluation and response, which is particularly valuable for organizations delivering seamless access to cloud infrastructure, production databases, and automated CI/CD pipelines that developers demand while providing the compliance and control that security requires.&#8221;</p></blockquote><p>This brings them more in line from a narrative point of view with vendors like <a href="https://www.p0.dev/">P0</a> and <a href="https://goteleport.com/">Teleport</a> who have capable platforms aimed to delivering JiT and cloud-centric privileged management for a broader array of stakeholders.</p><p>The acquisition is subject to customary closing conditions, including regulatory review, and is expected to close in Q1 2026. Financial terms of the transaction were not disclosed.</p><h3>Curated Industry Announcements</h3><ul><li><p><strong>AuthSignal</strong>: <a href="https://www.authsignal.com/blog/articles/worlds-first-palm-crypto-payment-at-nrf-2026?utm_source=radar.thecyberhut.com">World&#8217;s first palm crypto payment at NRF 2026</a></p></li><li><p><strong>CrowdStrike</strong>: <a href="https://www.crowdstrike.com/en-us/blog/architecture-of-agentic-defense-inside-the-falcon-platform/?utm_source=radar.thecyberhut.com">The Architecture of Agentic Defense: Inside the Falcon Platform</a></p></li><li><p><strong>Gathid</strong>: <a href="https://gathid.com/news/how-to-rethink-access-in-the-age-of-human-machine-fusion/?utm_source=radar.thecyberhut.com">How To Rethink Access In The Age Of Human-Machine Fusion</a></p></li><li><p><strong>One</strong> <strong>Identity</strong>: <a href="https://www.oneidentity.com/community/blogs/b/identity-governance-administration/posts/introducing-one-identity-manager-10-0?utm_source=radar.thecyberhut.com">Introducing One Identity Manager 10.0</a></p></li><li><p><strong>Strata</strong>: <a href="https://www.strata.io/blog/why-agentic-ai-forces-a-rethink-of-least-privilege/?utm_source=radar.thecyberhut.com">Why Agentic AI Forces a Rethink of Least Privilege</a></p></li><li><p><strong>Teleport</strong>: <a href="https://goteleport.com/blog/jit-for-engineers/?utm_source=radar.thecyberhut.com">Is JIT the Secret to Engineer Happiness?</a></p></li></ul><h3><strong>Identity Threat Intelligence Updates</strong></h3><ul><li><p><a href="https://medium.com/@kasimiseni251/analyzing-15-days-of-telnet-honeypot-data-de007ca66d0c">Analyzing 15 Days of Telnet Honeypot Data</a></p></li><li><p><a href="https://medium.com/s2wblog/detailed-analysis-of-lockbit-5-0-de92c03441f8">Detailed Analysis of LockBit 5.0</a></p></li><li><p><a href="https://flashpoint.io/blog/insider-threats-2025-intelligence-2026-strategy/?utm_source=radar.thecyberhut.com">Insider Threats: Turning 2025 Intelligence into a 2026 Defense Strategy</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/book-inquiry-consultation?back=1&quot;,&quot;text&quot;:&quot;Book Inquiry Consultation&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://calendly.com/simonmof/book-inquiry-consultation?back=1"><span>Book Inquiry Consultation</span></a></p><div><hr></div><h2><strong>Up Coming Event Attendance:</strong></h2><ul><li><p><a href="https://www.rsaconference.com/">RSAC 2026</a> - San Francisco - March 23-26</p></li><li><p><a href="https://www.idsalliance.org/event/identity-management-day-2026/">IDSA</a> - Identity Management Day 2026 - April 14</p></li><li><p><a href="https://iamtechday.org/eventos/iam-tech-day-sao-paulo-abril-2026/">IAM Tech Day</a> - Sao Paolo - April 22-23</p></li><li><p><a href="https://identiverse.com/">Identiverse</a> - Las Vegas - June 15-18</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03&quot;,&quot;text&quot;:&quot;Let's Meet at RSAC 2026&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/rsac-2026-briefing?back=1&amp;month=2026-03"><span>Let's Meet at RSAC 2026</span></a></p><div><hr></div><h2>Free Identity Security Cheat Sheets</h2><ul><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for-0e7">Top 30 IAM Metrics for B2C</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheat-sheet-top-30-iam-metrics-for">Top Metrics for B2E IAM</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-mcp-security">MCP Security</a></p></li><li><p>Cheat Sheet: <a href="https://radar.thecyberhut.com/p/cheatsheet-agentic-ai-identity-security">Agentic-AI Identity Security</a></p></li></ul><div><hr></div><h2>Identity Security Vendor Summary Reports</h2><p>Recently Added:</p><ul><li><p><a href="https://radar.thecyberhut.com/p/hypr">HYPR</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/axiad">Axiad</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/fusionauth">FusionAuth</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/apono">Apono</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/wso2">WSO2</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/hydden">Hydden</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/authsignal">AuthSignal</a></p></li><li><p><a href="https://radar.thecyberhut.com/p/entro-security">Entro Security</a></p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QBSO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png" width="991" height="998" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:998,&quot;width&quot;:991,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178126,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/183535050?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QBSO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 424w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 848w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1272w, https://substackcdn.com/image/fetch/$s_!QBSO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F727216f6-e1a5-4f91-9cda-0778112e130a_991x998.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Recent Content Updates</h2><h3>Improving the MTTA</h3><ul><li><p>A deep dive into the concept of improving the mean time to access for a range of different stakeholders to a broad array of high risk systems</p></li></ul><div id="youtube2-U7Xiz_8NZww" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;U7Xiz_8NZww&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/U7Xiz_8NZww?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Recent Webinar:</strong></h3><ul><li><p><strong>3 December</strong> - Modernizing AD Protection Against Lateral Movement and Privileged Access Abuse with Silverfort</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bkkd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/180490079?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bkkd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!bkkd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54fe7200-b913-42df-9845-d4709c50924b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration&quot;,&quot;text&quot;:&quot;Reserve Your Seat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://us06web.zoom.us/webinar/register/6317635612776/WN__amdoDeQSCKlsSstQobFZA#/registration"><span>Reserve Your Seat</span></a></p><div><hr></div><h3>Recent Podcasts</h3><ul><li><p>E67 The Analyst Brief: End of 2026 Acquisitions and Technology Consolidation</p></li></ul><div id="youtube2-Ym4x8qq7v2Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ym4x8qq7v2Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ym4x8qq7v2Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/podcast/&quot;,&quot;text&quot;:&quot;Submit Podcast Question&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/podcast/"><span>Submit Podcast Question</span></a></p><div><hr></div><h3><strong>Recent Research Reports:</strong></h3><ul><li><p>The Cyber Hut: <a href="https://www.radiantlogic.com/display/the-cyber-hut-a-market-guide-to-ispm-the-role-of-data-centric-identity-observability/?utm_source=radar.thecyberhut.com">A Market Guide to Identity Security Posture Management (ISPM): The Role of Data-Centric Identity Observability</a></p></li></ul><div id="youtube2-lpaU3tWrz84" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;lpaU3tWrz84&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/lpaU3tWrz84?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Recent Insight</strong></h3><ul><li><p><a href="https://radar.thecyberhut.com/p/a-review-of-crowdstrike-acquiring">Review of CrowdStrike acquiring SGNL</a></p></li><li><p><a href="https://sgnl.ai/2025/11/simon-moffatt-continuous-identity-architecture/?utm_source=radar.thecyberhut.com">Architecting Identity for a Real-time World</a></p></li><li><p><a href="https://www.p0.dev/blog/defining-and-securing-privileged-access-in-modern-environments?utm_source=radar.thecyberhut.com">Defining and Securing The Enterprise Production Stack</a></p></li><li><p><a href="https://www.reveal.security/blog/security-starts-when-authentication-ends-analysing-application-activity?utm_source=radar.thecyberhut.com">Analysing Application Activity</a></p></li><li><p><a href="https://sgnl.ai/2025/10/simon-moffatt-static-to-smart-continuous-identity/?utm_source=radar.thecyberhut.com">Building App Policies with Continuous Identity</a></p></li><li><p><a href="https://www.p0.dev/blog/why-pam-needs-to-evolve?utm_source=radar.thecyberhut.com">Why PAM Needs to Evolve</a></p></li><li><p><a href="https://www.reveal.security/blog/shifting-left-of-boom-in-identity">Shifting Left of Boom in Identity</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/insight/&quot;,&quot;text&quot;:&quot;Read More Insight &amp; Whitepapers&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/insight/"><span>Read More Insight &amp; Whitepapers</span></a></p><div><hr></div><h3><strong>Recent Industry Webinars</strong></h3><ul><li><p><a href="https://sgnl.ondemand.goldcast.io/on-demand/f0ebb54e-4b7b-4461-8eb7-892b5ca97879?utm_source=thecyberhut.com">Always On, Always Aware: Building a Continuous Identity Strategy</a></p></li><li><p><a href="https://us06web.zoom.us/webinar/register/7917525782306/WN_8xPKlp5pTASj9Nox_xha8A#/registration">Identity-First Security for AI Agents with Token Security</a></p></li><li><p>Addressing the IAM Data Problem: <a href="https://www.radiantlogic.com/resources/events-webinars/iam-data-problem-solving-security-compliance/?utm_source=radar.thecyberhut.com">A fireside chat with Radiant Logic</a></p></li><li><p><a href="https://www.silverfort.com/landing-page/webinar-2-hosts/cyber-hut-identity-security-playbook-3-june/">An Identity Security Playbook: The What and The Why</a> with Silverfort</p></li><li><p><a href="https://www.apono.io/putting-the-ai-in-iam-exploring-the-future-of-identity/">Putting the AI in IAM</a> a fireside chat with Apono</p></li><li><p><a href="https://www.thecyberhut.com/too-many-idps-why-now-how-to-rationalize/">Too Many IDPs: Why Now, How to Rationalize?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/webinars/&quot;,&quot;text&quot;:&quot;Watch More Webinars&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecyberhut.com/webinars/"><span>Watch More Webinars</span></a></p><div><hr></div><h3><strong>Recent Academy Episodes:</strong></h3><ul><li><p><a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">38: How does Identity and Access Management relate to Zero Trust?</a></p></li><li><p>37: <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">What is Identity Risk Management?</a></p></li><li><p>36: <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">What is Identity Data Management?</a></p></li><li><p>35: <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">What are Initial Access Brokers?</a></p></li><li><p>34: <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">What is SPIFFE?</a></p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/archive&quot;,&quot;text&quot;:&quot;See Training Archive&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://academy.thecyberhut.com/archive"><span>See Training Archive</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/consumer-identity-access-management&quot;,&quot;text&quot;:&quot;Enrol in B2C Design Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/consumer-identity-access-management"><span>Enrol in B2C Design Bootcamp</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thecyberhut.teachable.com/p/authentication-design-management&quot;,&quot;text&quot;:&quot;Enrol Authentication Bootcamp&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thecyberhut.teachable.com/p/authentication-design-management"><span>Enrol Authentication Bootcamp</span></a></p><div><hr></div><h3><strong>Recent Vendor Assessment Reports:</strong></h3><div id="youtube2-kljV2wFwSAw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kljV2wFwSAw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kljV2wFwSAw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Recent Vendor Introduction Interviews:</strong></h3><div id="youtube2-zB071aSe-jY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;zB071aSe-jY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/zB071aSe-jY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-sqI3BUTSh9w" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;sqI3BUTSh9w&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/sqI3BUTSh9w?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1&quot;,&quot;text&quot;:&quot;Book Vendor Interview&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://calendly.com/simonmof/the-cyber-hut-tv-vendor-intro?back=1"><span>Book Vendor Interview</span></a></p><div><hr></div><h3><strong>Recent Video Shorts:</strong></h3><div id="youtube2-2nw9UIPQS20" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2nw9UIPQS20&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2nw9UIPQS20?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-hwayO1XKrPs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;hwayO1XKrPs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/hwayO1XKrPs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-vSlrpcSI99s" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;vSlrpcSI99s&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/vSlrpcSI99s?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div id="youtube2-kCfxhuymaCs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kCfxhuymaCs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kCfxhuymaCs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Order IAM and Identity Security Books on Amazon:</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UQQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304220,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/165614249?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!UQQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UQQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3aed7a-1d46-4388-8648-3e45d109c288_1512x2016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><a href="https://amzn.eu/d/6zXsugs">IAM at 2035: A Future Guide to Identity Security</a> - Paperback, Audio, Kindle and Hardback</p></li><li><p><a href="https://amzn.eu/d/7sIkd8Q">CIAM Design Fundamentals</a> - Paperback, Audio and Kindle</p></li></ul><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!inqK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png" width="1296" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://radar.thecyberhut.com/i/176121649?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!inqK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 424w, https://substackcdn.com/image/fetch/$s_!inqK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 848w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1272w, https://substackcdn.com/image/fetch/$s_!inqK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9af9792-e3be-453e-834b-8c0b1e352812_1296x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecyberhut.com/vendor-map/&quot;,&quot;text&quot;:&quot;Download Latest 120 Vendor Directory&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.thecyberhut.com/vendor-map/"><span>Download Latest 120 Vendor Directory</span></a></p><div><hr></div>]]></content:encoded></item></channel></rss>