#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.


In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.


Discover:

  • The real difference between non-human identities and static keys
  • Why legacy secrets management is breaking in the cloud and automation age
  • Hush Security’s journey from stealth mode to active customers
  • The business case for removing vaults (and the risks with “hope and prayer” key rotation)
  • How to transition to policy-based access—and measurement metrics for success
  • Fun discussions on pancakes vs. waffles in security leadership (really!)


Learn more about Hush Security and get a free environment assessment: hush.security/idac

Connect with Micha: https://www.linkedin.com/in/micharave/


Connect with IDAC on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com


#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter


Chapters / Timestamps:

00:00 - Welcome and Introduction (Hosts: Jeff and Jim)

01:00 - Introducing Micha Rave and Hush Security

03:00 - Micha’s Background and the Hush Team’s Journey

06:00 - What Is Hush Security and Why Now?

09:00 - Leaving Stealth Mode: Patents and Novel Approaches

12:00 - What Makes Hush Special? Remediation vs. Visibility

15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps

18:00 - Non-Human Identities: Static Keys, Secrets, and Access

22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software

26:00 - The Scale of Machine Identity in the Cloud and Automation Age

29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access

34:00 - From Scanning to Policy Enforcement: How Hush Works

39:00 - Metrics, Success, and Executive Buy-in for Modern IAM

43:00 - How to Get Started with Hush Security (Free Assessments)

46:00 - Micha’s Conference Plans and Final Thoughts

49:00 - Pancakes or Waffles?


Keywords:

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management

Episoder(410)

#58 - Browser Tracking and the Identity Effects with Vittorio Bertocci

#58 - Browser Tracking and the Identity Effects with Vittorio Bertocci

Jim and Jeff talk with Vittorio Bertocci, Principal Architect with Auth0, about the effects of browser tracking and how it is affecting the identity space.Connect with Vittorio on LinkedIn here: https...

24 Aug 202059min

#57 - Learning about the Identity Defined Security Alliance with Julie Smith

#57 - Learning about the Identity Defined Security Alliance with Julie Smith

Jim and Jeff talk with Julie Smith, Executive Director of the Identity Defined Security Alliance (IDSA), about their mission, IAM frameworks they have developed, and future focus.Episode Links: Connec...

17 Aug 202045min

#56 - What is FIDO with Andrew Shikiar

#56 - What is FIDO with Andrew Shikiar

Jim and Jeff talk with Andrew Shikiar, Executive Director and Chief Marketing Officer of the FIDO Alliance, about what FIDO is and the challenges it seeks to solve.FIDO Alliance website: https://fidoa...

10 Aug 202046min

#55 - Solving Identity Challenges with MFA

#55 - Solving Identity Challenges with MFA

Jim and Jeff talk about the challenges of multifactor authentication and solving some of the unique challenges that come with it.A Security Update From Instacart: https://news.instacart.com/a-security...

3 Aug 202049min

#54 - Mark Perry on Open Banking

#54 - Mark Perry on Open Banking

Jim and Jeff talk with Mark Perry, CTO for Ping Identity APAC region, about his Identiverse talks around the user experience with IAM and the Open Banking Standard.Connect with Mark on LinkedIn here: ...

27 Jul 202042min

#53 - Twitter, MGM, and ITSM IGA with Darran Rolls

#53 - Twitter, MGM, and ITSM IGA with Darran Rolls

Jim and Jeff talk with Darran Rolls, former CTO and CISO at SailPoint and current "Identity Dude" about the recent Twitter breach, the new revelations as to the scope of the MGM data leak, and how ITS...

20 Jul 202056min

#52 - Jackson Shaw, IAM Jedi

#52 - Jackson Shaw, IAM Jedi

Jim and Jeff talk with an IAM Knight of the Old Republic, Jackson Shaw, about his 36 years in the IAM space, some of his observations over the years, and the intersection of IT Service Management (ITS...

13 Jul 202054min

#51 - Insider Threat with Phil from Preempt

#51 - Insider Threat with Phil from Preempt

Jim, Jeff, and special guest Phil Meneses from Preempt Security talk about insider threat and an upcoming report that Preempt is releasing about the hidden risks of workforce identities.Click here to ...

6 Jul 202041min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
tomprat-med-gunnar-tjomlid
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
energi-og-klima
shifter
rss-ki-praten
smart-forklart
rss-impressions-2
pedagogisk-intelligens
elektropodden
rss-polypod
rss-alt-vi-kan
rss-ai-forklart
rss-teknologioptimistene-energibransjens-it-podcast
rss-for-alarmen-gar
rss-digitaliseringspadden
rss-fjorsilkebris-podcast
rss-anleggspraten