#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.


In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.


Discover:

  • The real difference between non-human identities and static keys
  • Why legacy secrets management is breaking in the cloud and automation age
  • Hush Security’s journey from stealth mode to active customers
  • The business case for removing vaults (and the risks with “hope and prayer” key rotation)
  • How to transition to policy-based access—and measurement metrics for success
  • Fun discussions on pancakes vs. waffles in security leadership (really!)


Learn more about Hush Security and get a free environment assessment: hush.security/idac

Connect with Micha: https://www.linkedin.com/in/micharave/


Connect with IDAC on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com


#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter


Chapters / Timestamps:

00:00 - Welcome and Introduction (Hosts: Jeff and Jim)

01:00 - Introducing Micha Rave and Hush Security

03:00 - Micha’s Background and the Hush Team’s Journey

06:00 - What Is Hush Security and Why Now?

09:00 - Leaving Stealth Mode: Patents and Novel Approaches

12:00 - What Makes Hush Special? Remediation vs. Visibility

15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps

18:00 - Non-Human Identities: Static Keys, Secrets, and Access

22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software

26:00 - The Scale of Machine Identity in the Cloud and Automation Age

29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access

34:00 - From Scanning to Policy Enforcement: How Hush Works

39:00 - Metrics, Success, and Executive Buy-in for Modern IAM

43:00 - How to Get Started with Hush Security (Free Assessments)

46:00 - Micha’s Conference Plans and Final Thoughts

49:00 - Pancakes or Waffles?


Keywords:

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management

Episoder(410)

#66 - IAM Certifications with Henry Bagdasarian from the Identity Management Institute

#66 - IAM Certifications with Henry Bagdasarian from the Identity Management Institute

Jim and Jeff talk with Henry Bagdasarian, Founder, and President of the Identity Management Institute about the benefits and options there are for getting certified in the IAM field.Show Links:Connect...

19 Okt 202038min

#65 - Inside the IGA Sales Cycle with Mary Berg

#65 - Inside the IGA Sales Cycle with Mary Berg

Jim and Jeff talk with Mary Berg, Vice President of Channels and Alliances with CloudBridge, about the IGA trends she is seeing before going into what the IGA sales cycle is like.Show Links:Connect wi...

12 Okt 202033min

#64 - Identity Product Design with Mary Writz

#64 - Identity Product Design with Mary Writz

Jim and Jeff talk with Mary Writz, Vice President of Product Management at ForgeRock, about the challenges and thought process that goes into designing an identity product.Show Links:Connect with Mary...

5 Okt 202046min

#63 - The Open-Measure Initiative and Measuring IAM Performance with David Doret

#63 - The Open-Measure Initiative and Measuring IAM Performance with David Doret

Jim and Jeff talk with David Doret, IT Risk & Cybersecurity: IAM & PAM Manager at BNP Paribas, and founder of the Open-Measure project about the initiative and his upcoming research about measuring IA...

28 Sep 202044min

#62 - Managing Third Party Identity with David Pignolet from SecZetta

#62 - Managing Third Party Identity with David Pignolet from SecZetta

Jim and Jeff talk with David Pignolet, founder, and CEO of SecZetta, about how they address the problems of managing third party identities and some of their associated risks.Show Links: Connect with ...

21 Sep 202037min

#61 - Zero Trust & "Strong" Authentication with Rebecca Nielsen

#61 - Zero Trust & "Strong" Authentication with Rebecca Nielsen

Jim and Jeff talk with Rebecca Nielsen, Director of Technology Integrations at PKH Enterprises, about Zero Trust, "Strong" Authentication, and her work on the US Department of Defense ICAM reference d...

14 Sep 202031min

#60 - Identity Centric Security with Jerrod Brennen

#60 - Identity Centric Security with Jerrod Brennen

Jim and Jeff talk with Jerod Brennen, Music Teacher and IAM Renaissance Man, about his IAM journey, Identity Centric Security, and some of the IAM education sessions that he has developed.Show Links: ...

7 Sep 202045min

#59 - Optimizing Security & Convenience with Frank Villavicencio

#59 - Optimizing Security & Convenience with Frank Villavicencio

Jim and Jeff talk with Frank Villavicencio, Head of Product for Shared Services at ADP, about the IAM user experience and how to optimize security and convenience.Connect with Frank on LinkedIn here: ...

31 Aug 202059min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
teknisk-sett
tomprat-med-gunnar-tjomlid
nasjonal-sikkerhetsmyndighet-nsm
energi-og-klima
shifter
smart-forklart
rss-ki-praten
rss-impressions-2
pedagogisk-intelligens
elektropodden
rss-ai-forklart
hans-petter-og-co
rss-polypod
rss-for-alarmen-gar
rss-bits-and-bytes-for-advokater
rss-snakk-om-sikkerhet
rss-alt-vi-kan
rss-alt-som-gar-pa-strom