The Analyst Brief

The Cyber Hut
undefined
Apr 25, 2025 • 48min

E61 - RSA Conference 2025 Predictions / Security for AI / Funding Rounds for AuthMind, Push Security & UnoSecur

KeywordsRSA Conference, Identity Security, AI in Cybersecurity, Cybersecurity Trends, Identity Management, Funding in Cybersecurity, Observability, AI Security, Cyber Threats, Identity Protection, cybersecurity, identity protection, AI trends, discovery, observability, response strategies, browser security, identity security, ITDR, innovationChapters00:00 Introduction to RSA Conf 2025 and Anticipation03:01 The Importance of Identity at RSA05:55 AI's Role in Cybersecurity08:55 Challenges in AI Security11:58 Funding Trends in Identity Protection15:04 Observability in Identity Management25:31 The Importance of Discovery in Cybersecurity28:02 Innovative Approaches to Identity Protection35:12 Emerging Trends in AI and Identity Security41:03 The Future of AI in CybersecurityLinksAuthMind Funding RoundPush Security Funding RoundUnosecur Funding Round
undefined
Feb 18, 2025 • 50min

E60 - SGNL $30m Raise / What is Identity Security / IAM Standards / Behaviour Monitoring

SummaryThis episode explores the importance of standards, the role of identity in cybersecurity, and the challenges faced by organizations in managing identity security effectively. The conversation highlights the need for innovation and collaboration in the identity space, as well as the critical nature of identity being an attack surface - especially vendors in the JML firing line. How can behaviour monitoring help?Keywordsidentity security, funding news, leadership changes, market trends, cybersecurity, access management, identity governance, AI in security, standards in identity, identity as a service, identity management, security controls, behavioral analysis, customer experience, identity standards, identity security, digital identity, identity governance, cybersecurity, identity threatsChapters00:00 Introduction 03:12 Market News: Funding and Innovations12:37 Leadership Changes in Identity Security14:04 The Evolution of Identity Security24:11 Identity as a Strategic Business Element25:57 The Security Landscape and Vendor Commitments28:00 Evolving Security Controls in Identity Management30:11 Behavioral Analysis: The Missing Piece32:00 The Strategic Importance of Identity Management34:03 Identity as a Brand and Customer Experience35:58 The Maturity of Identity Solutions37:56 Decoupling User Experience from Identity Security39:49 Complexity in Identity Standards and Security44:07 Emerging Threats and the Need for Standards
undefined
Feb 4, 2025 • 41min

E59 - Token Security Funding / Jumpcloud + Stack Identity / Identity Data Management

Summary In this episode of the Analyst Brief Podcast, Simon and Dave return to discuss the latest funding trends in identity security, the rise of non-human identity (NHI), and the importance of governance and data management in identity solutions. Useful Links: Token Security raise $20 million Jumpcloud acquires Stack Identity AI Prompt Engineering Protection Keywords identity security, funding, non-human identity, governance, AI, identity management, chief data officer, AI, identity security, prompt engineering, content authenticity, digital transformation, business opportunities Chapters 00:00 Introduction and Podcast Evolution 03:04 Funding Trends in Identity Security 08:43 The Rise of Non-Human Identity (NHI) 15:03 Governance and Identity Data Management 23:38 Emerging Trends in Data Technology 26:20 The Role of Chief Data Officers 30:12 AI's Impact on Identity and Security 32:38 Navigating the Challenges of AI and Data Authenticity
undefined
Oct 8, 2024 • 41min

E58 - Microsoft SFI / Okta SIC / Funding for Apono, Hydden and P0 Security

Summary In this episode, Simon and David Mardy discuss the rapidly evolving landscape of identity security, highlighting significant trends, initiatives from major tech companies, and the importance of cyber resilience. They explore the recent funding rounds for startups in the identity space, emphasizing the need for innovative solutions to address ongoing challenges in identity governance and access management. The conversation underscores the critical role of identity security in today's digital business environment and the necessity for organizations to adapt to emerging threats. Keywords identity security, access management, cyber resilience, Microsoft, Okta, funding rounds, identity governance, PAM, IGA, cybersecurity Links Microsoft Secure Future Initiative Okta Secure Identity Commitment Apono $15m funding Hydden $4m funding P0 Security $15m funding
undefined
Sep 17, 2024 • 31min

E57 - Back to School 2024 Episode

Summary In this episode of the Week in Identity podcast, Simon and David discuss the latest trends and developments in identity security, including market activity, funding rounds, and significant acquisitions. They delve into the importance of NIST guidelines, the rise of non-human identity (NHI), and the implications of recent acquisitions by MasterCard and Salesforce. The conversation highlights the evolving landscape of identity management and the critical need for organizations to adapt to new challenges in cybersecurity. Chapters 00:00 Introduction to the Week in Identity Podcast 03:52 NIST Guidelines and Identity Assurance 06:30 Aembit Funding Rounds and Non-Human Identity 13:42 Acquisitions in Identity: IndyKite and 3Edges 20:17 MasterCard and Recorded Future 26:39 Salesforce and Own Data
undefined
Jul 19, 2024 • 43min

E56 - Emergency Episode Discussing the Global Crowdstrike Issue

Simon and David convene for a special episode to discuss the ongoing global IT outages caused by a Crowdstrike update. Note this was released Friday 19th July 9am PST / 5pm BST
undefined
Jun 19, 2024 • 36min

E55 - Identiverse, Identity Week Europe and Gartner SRM

Summary In this episode, Simon and David discuss the recent identity conferences they attended, including Identiverse and Identity Week. They highlight the growing interest in identity across various industries and the need for resilience and security in identity management. They also delve into the topics of decentralized identity and generative AI, emphasizing the importance of tying security investment to business outcomes and altering the way we think about data and technology. They conclude by mentioning future episodes dedicated to decentralized identity and generative AI. Keywords identity conferences, Identiverse, Identity Week, resilience, security, decentralized identity, generative AI, security investment, business outcomes Takeaways Identity conferences have seen a surge in interest from various industries, indicating the growing importance of identity management. Resilience and security are crucial in identity management, especially in the face of evolving threats and attacks. Decentralized identity and generative AI are emerging topics that require careful consideration and alignment with business goals. Security investment should be tied to business outcomes and the specific needs of the organization. The identity and security industry is still relatively young and evolving, requiring a shift in thinking and approach. Links Identiverse Identity Week Europe Gartner Security & Risk
undefined
May 24, 2024 • 39min

E54 - CyberArk and Venafi / QRadar and Palo Alto / Akamai and NoName Security

Summary In this episode, Simon and David discuss recent acquisitions in the identity and access management space, including Palo Alto's acquisition of QRadar, Akamai's acquisition of NoName, and CyberArk's acquisition of Venafi. They explore the importance of resilience in IAM infrastructure and the growing need for managing machine identities and workloads. The conversation highlights the challenges and opportunities in securing non-human identities and the role of PAM in addressing these issues. They also touch on the dark web and identity-based threats. Keywords identity and access management, acquisitions, resilience, IAM infrastructure, machine identities, workloads, PAM, non-human identities, dark web, identity-based threats Takeaways Recent acquisitions in the IAM space include Palo Alto's acquisition of Q Radar, Akamai's acquisition of No Name Security, and CyberArk's acquisition of Venafi. Managing machine identities and workloads is a growing challenge in the IAM space. PAM plays a crucial role in securing non-human identities. Chapters 00:00 Introduction and Overview 02:40 Recent Acquisitions in the IAM Space 06:02 The Importance of Resilience in IAM Infrastructure 09:12 Managing Machine Identities and Workloads 15:23 The Role of PAM in Securing Non-Human Identities 26:14 Upcoming Presentation at Identiverse
undefined
May 17, 2024 • 43min

E53 - A Review of RSA Conference 2024 - Part 2

Summary In this episode, Simon and David discuss the convergence of identity and cybersecurity, particularly in the context of cloud adoption. They explore the challenges and opportunities that arise from this convergence and the impact on organizations of different sizes. They also touch on the confusion caused by the abundance of acronyms in the industry and the need for clarity and standardization. Overall, they emphasize the importance of protecting identity components and the critical role of identity in security. The conversation explores the challenges and opportunities in the identity and access management (IAM) space, with a focus on the importance of data management and the need for effective discovery and remediation processes. The fragmentation of identity systems and the lack of visibility into identities and their interactions are identified as key issues. The acquisition of Q Radar by Palo Alto is discussed as a potential game-changer in the IAM space. The conversation concludes with the recognition that while automation and AI have their place, human involvement is still crucial for effective remediation. Keywords identity, cybersecurity, convergence, cloud, challenges, opportunities, acronyms, standardization, protection, security, identity and access management, IAM, data management, discovery, remediation, fragmentation, visibility, Q Radar, Palo Alto, automation, AI, human involvement Takeaways Identity and cybersecurity are converging, particularly in the context of cloud adoption. Organizations of different sizes face different challenges and opportunities in managing identity and security. The abundance of acronyms in the industry can be confusing, and there is a need for clarity and standardization. Protecting identity components is crucial, as identity often plays a central role in security breaches. Effective data management is crucial in the identity and access management space. Fragmentation of identity systems and lack of visibility into identities and their interactions are key challenges. The acquisition of Q Radar by Palo Alto has the potential to impact the IAM space. While automation and AI have their place, human involvement is still necessary for effective remediation. Chapters 00:00 Introduction and Post-RSA Recovery 01:23 Unpacking the Convergence of Identity and Cybersecurity 07:13 Lessons from the Transition from Horses to Cars 09:08 The Confusion of Acronyms and the Need for Clarity 13:25 The Hype Cycle and the Trajectory of New Technologies 15:16 The Impact of Cloud Adoption on Identity and Security 23:21 The Transient Tilt in the Cloud and the Importance of Protecting Identity Components 24:13 The Importance of Data Management in IAM 27:38 Challenges of Fragmentation and Lack of Visibility 30:53 The Potential Impact of the Q Radar Acquisition 34:44 The Role of Automation and Human Involvement in Remediation
undefined
May 14, 2024 • 35min

E52 - A Review of RSA Conference 2024 - Part 1

Summary In this episode, Simon and David discuss their experiences at the RSA Conference 2024 and highlight the key themes and trends in the identity and access management (IAM) space. They emphasize the growing importance of identity in the security landscape and the increasing integration of identity into RSA. They also discuss the impact of AI and Gen AI on IAM, the need for better discovery and visibility in identity systems, and the challenges of transitioning from legacy technology to new, intelligent systems. They conclude by highlighting the importance of preparing data for the Gen AI world and the need for organizations to adapt and embrace new technologies in order to stay competitive. Keywords RSA Conference, RSAC2024, identity and access management, IAM, security, AI, Gen AI, discovery, visibility, legacy technology, data preparation, competitive advantage Takeaways Identity is becoming increasingly important in the security landscape, and RSA is a key event for identity professionals. The integration of identity into themes and topics at RSAC2024 is a reflection of the growing significance of identity in the industry. AI and Gen AI are driving the need for more intelligent identity systems and the transition from legacy technology. Discovery and visibility are crucial in identity systems, and organizations need to break down silos and integrate their identity infrastructure. Preparing data for the Gen AI world is essential for organizations to stay competitive and take advantage of new technologies. Chapters 00:00 Introduction and Overview of RSA Conference 13:02 The Growing Importance of Identity in the Security Landscape 21:03 Challenges of Transitioning from Legacy Technology to New, Intelligent Systems 25:01 The Impact of AI and Gen AI on IAM 31:05 Preparing Data for the Gen AI World 33:30 Preview of Next Episode on Fraud and Cloud

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app