If you do not find what you are looking for try a different term or contact us.
Introductory Blurb As Identity becomes central to agentic security, Privileged Access Management (PAM) is undergoing a structural shift. It is currently an underlooked category which deserves more attention as we prepare for an identity centric agentic stack. Our opinion is that privileged access will be central to how human, agents and machines (NHIs) evolve within […]
...The managed detection and response market reached $9.6 billion in 2025 and is projected to grow to $46.9 billion by 2035, reflecting a 17.2% compound annual growth rate driven by rising cyber threats and increasing highly skilled analyst shortage. Despite this growth, operational challenges still remain. According to the 2025 SANS SOC Survey, 69% of […]
...Actionable Summary Despite decades of investment in IAM, IGA, and PAM, enterprises remain highly vulnerable to identity-based attacks. The root cause is not policy failure, but implementation failure. We’re introducing the concept of Identity Dark Matter. This research defines Identity Dark Matter as the unmanaged identity artifacts within an enterprise stack: i.e., local accounts, legacy […]
...Author Aqsa Taylor is the Chief Research Officer at Software Analyst Cyber Research, where she leads research initiatives and the CISO Arm (security leaders community). She is a published author with over a decade of experience building cloud security platforms and experience consulting more than 44% of Fortune 100 organizations on their security posture. Readers, […]
...Overview This report examines a blueprint for how a company can evolve from consumer password management into a credible enterprise identity security platform. We focus on 1Password because it has reached a milestone that many enterprise security vendors aspire to but rarely achieve: scaling into a large, durable enterprise business while simultaneously attempting to redefine […]
...Readers, One of the big trends our firm is tracking into 2026 is the convergence of specific elements of Cloud Security and Security Operations because of the rise of AI Agents. The focus is moving toward runtime as opposed to posture. Contrarian, but it’s the reality. Let’s be clear: these are two different teams within […]
...Subscribe for a weekly digest on the best private technology companies.