#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.


In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.


Discover:

  • The real difference between non-human identities and static keys
  • Why legacy secrets management is breaking in the cloud and automation age
  • Hush Security’s journey from stealth mode to active customers
  • The business case for removing vaults (and the risks with “hope and prayer” key rotation)
  • How to transition to policy-based access—and measurement metrics for success
  • Fun discussions on pancakes vs. waffles in security leadership (really!)


Learn more about Hush Security and get a free environment assessment: hush.security/idac

Connect with Micha: https://www.linkedin.com/in/micharave/


Connect with IDAC on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com


#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter


Chapters / Timestamps:

00:00 - Welcome and Introduction (Hosts: Jeff and Jim)

01:00 - Introducing Micha Rave and Hush Security

03:00 - Micha’s Background and the Hush Team’s Journey

06:00 - What Is Hush Security and Why Now?

09:00 - Leaving Stealth Mode: Patents and Novel Approaches

12:00 - What Makes Hush Special? Remediation vs. Visibility

15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps

18:00 - Non-Human Identities: Static Keys, Secrets, and Access

22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software

26:00 - The Scale of Machine Identity in the Cloud and Automation Age

29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access

34:00 - From Scanning to Policy Enforcement: How Hush Works

39:00 - Metrics, Success, and Executive Buy-in for Modern IAM

43:00 - How to Get Started with Hush Security (Free Assessments)

46:00 - Micha’s Conference Plans and Final Thoughts

49:00 - Pancakes or Waffles?


Keywords:

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management

Jaksot(393)

Identity At The Center #9: Authentication Talk with Mario from Callsign

Identity At The Center #9: Authentication Talk with Mario from Callsign

On this episode, Jim and Jeff talk with Mario Dusaj, solutions architect at Callsign.com, about his thoughts around creating a good authentication experience. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message or email us at questions@identityatthecenter.com

30 Elo 201935min

Identity At The Center #8: Talking IAM with Ash Motiwala

Identity At The Center #8: Talking IAM with Ash Motiwala

On this episode, Jim and Jeff talk with Ash Motiwala, Managing Partner at Identropy, about the history of Identropy, current IAM trends, and the future of IAM. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

23 Elo 201938min

Identity At The Center #7: How the IAM Value Proposition Has Changed

Identity At The Center #7: How the IAM Value Proposition Has Changed

On this episode, Jim and Jeff talk with Luis Almeida, VP of Business Development at Identropy, about how the value proposition for IAM has changed over the years. You can read his take here. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

16 Elo 201945min

Identity At The Center #6: Black Hat 2019

Identity At The Center #6: Black Hat 2019

Warshipping, US military CAC's on the way out, and how to identify Deepfakes... all topics of discussion brought to the table by Jeff who has his boots on the ground at the annual Black Hat conference in Las Vegas. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

9 Elo 201933min

Identity At The Center #5: What Just Left Your Wallet?

Identity At The Center #5: What Just Left Your Wallet?

On this episode, Jim and Jeff talk about the recent news regarding the Capital One data breach and what might have been the motivations behind the incident. They also reference this video when talking about man in the middle attacks against two-factor authentication. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

2 Elo 201928min

Identity At The Center #4: The Circle of (IGA) Life

Identity At The Center #4: The Circle of (IGA) Life

On this episode, Jim talks with Jeff about his idea in an upcoming article he is writing about the IGA lifecycle: Approve - Provision - Collect - Verify Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

26 Heinä 201930min

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

On this episode, Jim and Jeff talk about Kacy Zurkus' article "Healthcare Organizations Too Confident in Cybersecurity" for InfoSecurity Magazine and why multi-factor authentication (MFA) isn't more widely adopted. Jeff also poses a question to Jim: Do you choose MFA or Privileged Access Management (PAM) first if you can only do one? Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

19 Heinä 201932min

Identity At The Center #2: Getting into the sexy world of IAM

Identity At The Center #2: Getting into the sexy world of IAM

With Jim on vacation this week, Jeff has called up Fletcher Edington as a pinch hitter. Fletcher talks about his path from college intern to IAM implementation engineer to IAM sales. They also talk about how to get young talent into the IAM space to solve the UI and design challenges of the future. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

12 Heinä 201931min