#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.


In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.


Discover:

  • The real difference between non-human identities and static keys
  • Why legacy secrets management is breaking in the cloud and automation age
  • Hush Security’s journey from stealth mode to active customers
  • The business case for removing vaults (and the risks with “hope and prayer” key rotation)
  • How to transition to policy-based access—and measurement metrics for success
  • Fun discussions on pancakes vs. waffles in security leadership (really!)


Learn more about Hush Security and get a free environment assessment: hush.security/idac

Connect with Micha: https://www.linkedin.com/in/micharave/


Connect with IDAC on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com


#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter


Chapters / Timestamps:

00:00 - Welcome and Introduction (Hosts: Jeff and Jim)

01:00 - Introducing Micha Rave and Hush Security

03:00 - Micha’s Background and the Hush Team’s Journey

06:00 - What Is Hush Security and Why Now?

09:00 - Leaving Stealth Mode: Patents and Novel Approaches

12:00 - What Makes Hush Special? Remediation vs. Visibility

15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps

18:00 - Non-Human Identities: Static Keys, Secrets, and Access

22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software

26:00 - The Scale of Machine Identity in the Cloud and Automation Age

29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access

34:00 - From Scanning to Policy Enforcement: How Hush Works

39:00 - Metrics, Success, and Executive Buy-in for Modern IAM

43:00 - How to Get Started with Hush Security (Free Assessments)

46:00 - Micha’s Conference Plans and Final Thoughts

49:00 - Pancakes or Waffles?


Keywords:

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management

Jaksot(395)

Identity at the Center #51 - Insider Threat with Phil from Preempt

Identity at the Center #51 - Insider Threat with Phil from Preempt

Jim, Jeff, and special guest Phil Meneses from Preempt Security talk about insider threat and an upcoming report that Preempt is releasing about the hidden risks of workforce identities. Click here to access the Preempt Whitepaper "2020 Identity Risk Infographic": https://www.preempt.com/white-paper/2020-identity-risk-infographic/ Visit Preempt Security here: https://www.preempt.com/identity-information-detect-threats/ Connect with Phil on LinkedIn here: https://www.linkedin.com/in/philmeneses/ Visit the show at www.IdentityAtTheCenter.com and follow @IDACPodcast on Twitter.

6 Heinä 202041min

Identity at the Center #50 - It's Our Birthday!

Identity at the Center #50 - It's Our Birthday!

Jim and Jeff talk almost nothing about IAM and instead reflect on the show turning 1, some of their favorite episodes from the first year, a new show website, and what to expect in the future of the podcast. Visit the show at www.IdentityAtTheCenter.com and follow @IDACPodcast on Twitter.

29 Kesä 202034min

Identity at the Center #49 - Role Mining Lessons Learned

Identity at the Center #49 - Role Mining Lessons Learned

Jim and Jeff talk with IAM Architect and fellow Identropian Helio Gomez about the lessons they have all learned when it comes to role mining and engineering. Thanks to listener Andrew C. for the topic suggestion! Connect with Helio here: https://www.linkedin.com/in/helio-gomez-1507765/ Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Email the show at questions@identityatthecenter.com or send us a message on LinkedIn.

22 Kesä 202042min

Identity at the Center #48 - Eve Maler, IAM UMAnitarian

Identity at the Center #48 - Eve Maler, IAM UMAnitarian

Jim and Jeff talk with Eve Maler, CTO at ForgeRock about her work in the IAM space which includes helping found standards like XML and UMA, why we think blockchain identity is over-hyped, and some of the highlights of the recently released ForgeRock 2020 Consumer Identity Breach Report. 2020 ForgeRock Consumer Identity Breach Report: https://www.forgerock.com/resources/2020-consumer-identity-breach-report ForgeRock ROI Calculator: https://www.forgerock.com/roi-calculator/ Find Eve here: Twitter: https://twitter.com/xmlgrrl LinkedIn: https://www.linkedin.com/in/evemaler/ Connect with Jim and Jeff on LinkedIn here: Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Email the show at questions@identityatthecenter.com or send us a message on LinkedIn.

15 Kesä 202050min

Identity At The Center #47 - IAM Program Drivers & Requirements

Identity At The Center #47 - IAM Program Drivers & Requirements

Jim and Jeff talk about IAM Program Drivers & Requirements and which comes first. LastPass Report: https://www.lastpass.com/identity-and-access-management-by-industry Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Email the show at questions@identityatthecenter.com or send us a message on LinkedIn.

8 Kesä 202052min

Identity At The Center #46 – The 2020 KuppingerCole Leadership Compass for Privileged Access Management

Identity At The Center #46 – The 2020 KuppingerCole Leadership Compass for Privileged Access Management

Jim and Jeff talk about some of the findings in the recently released 2020 KuppingerCole Leadership Compass for Privileged Access Management. Grab the report from any of these leading vendors (in alphabetical order): BeyondTrust: https://www.beyondtrust.com/resources/whitepapers/kuppingercole-leadership-compass-privilege-management CyberArk: https://lp.cyberark.com/kuppingercole-leadership-compass-pam-2020.html Thycotic: https://thycotic.com/why-thycotic/analysts-opinions/kuppingercole-leadership-compass-report/ Identiverse 2020 Conference Link: https://identiverse.com/ Connect with Jim and Jeff on LinkedIn here: Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Email the show at questions@identityatthecenter.com or send us a message on LinkedIn.

1 Kesä 202056min

Identity At The Center #45 - The 2020 Verizon Data Breach Investigations Report

Identity At The Center #45 - The 2020 Verizon Data Breach Investigations Report

Jim and Jeff talk about some of the findings in the recently released 2020 Verizon Data Breach Investigations Report (link below). Report link: https://enterprise.verizon.com/resources/reports/dbir/ Identiverse 2020 Conference Link: https://identiverse.com/ Connect with us on LinkedIn: Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Email your questions, suggestions, and topic requests to the show at questions@identityatthecenter.com

25 Touko 202050min

Identity At The Center #44 - IDSA Report-Identity A Work In Progress

Identity At The Center #44 - IDSA Report-Identity A Work In Progress

Jim and Jeff talk about some of the findings in the recently released Identity Defined Security Alliance (IDSA) report "Identity Security: A Work In Progress" Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message or email us at questions@identityatthecenter.com.

18 Touko 202035min