DiscoverIdentity at the Center#377 - Sponsor Spotlight - Hush Security
#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

Update: 2025-10-01
Share

Description

This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.


In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.


Discover:

  • The real difference between non-human identities and static keys
  • Why legacy secrets management is breaking in the cloud and automation age
  • Hush Security’s journey from stealth mode to active customers
  • The business case for removing vaults (and the risks with “hope and prayer” key rotation)
  • How to transition to policy-based access—and measurement metrics for success
  • Fun discussions on pancakes vs. waffles in security leadership (really!)


Learn more about Hush Security and get a free environment assessment: hush.security/idac

Connect with Micha: https://www.linkedin.com/in/micharave/


Connect with IDAC on LinkedIn:

Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com


#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter


Chapters / Timestamps:

00:00 - Welcome and Introduction (Hosts: Jeff and Jim)

01:00 - Introducing Micha Rave and Hush Security

03:00 - Micha’s Background and the Hush Team’s Journey

06:00 - What Is Hush Security and Why Now?

09:00 - Leaving Stealth Mode: Patents and Novel Approaches

12:00 - What Makes Hush Special? Remediation vs. Visibility

15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps

18:00 - Non-Human Identities: Static Keys, Secrets, and Access

22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software

26:00 - The Scale of Machine Identity in the Cloud and Automation Age

29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access

34:00 - From Scanning to Policy Enforcement: How Hush Works

39:00 - Metrics, Success, and Executive Buy-in for Modern IAM

43:00 - How to Get Started with Hush Security (Free Assessments)

46:00 - Micha’s Conference Plans and Final Thoughts

49:00 - Pancakes or Waffles?


Keywords:

IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

#377 - Sponsor Spotlight - Hush Security

#377 - Sponsor Spotlight - Hush Security

Identity at the Center