5 Indicators of Cyber Security Market Failure

Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook description would be something that articulated the “inefficient distribution of goods and… Continue reading 5 Indicators of Cyber Security Market Failure

2H2019 Identity Management Funding Analysis

Back in July, I wrote an article taking a brief look at venture capitalist funding patterns within the identity and access management space, for the first half of 2019.  I am going to revisit that topic, but for the second half of the year.
Key Fa… Continue reading 2H2019 Identity Management Funding Analysis

5 Minute Briefing: Designing for Security Outcomes

This is the first in a set of blogs focused on high level briefings – typically 5 minute reads, covering design patterns and meta trends relating to security architecture and design.
When it comes to cyber security design, there have been numerous ways… Continue reading 5 Minute Briefing: Designing for Security Outcomes

1H2019 Identity Management Funding Analysis

As the first half of 2019 has been and gone, I’ve taken a quick look at the funding rounds that have taken place so far this year, within the identity and access management space and attempted some coarse grained analysis.  The focus is global and… Continue reading 1H2019 Identity Management Funding Analysis

Next Generation Distributed Authorization

Many of today’s security models spend a lot of time focusing upon network segmentation and authentication.  Both of these concepts are critical in building out a baseline defensive security posture.  However, there is a major area that is oft… Continue reading Next Generation Distributed Authorization

How To Build An Authentication Platform

Today’s authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an Id and password.  Authentication and the login experience, is the application entry point and can make o… Continue reading How To Build An Authentication Platform