#377 - Sponsor Spotlight - Hush Security
Description
This episode is sponsored by Hush Security. Visit hush.security/idac to learn more.
In this sponsored episode of Identity at the Center, hosts Jeff Steadman and Jim McDonald spotlight Hush Security, a company emerging from stealth with an innovative approach to machine identity and access management. CEO and co-founder Micha Rave explains why traditional secrets vaults can’t keep up with today’s scale, what it means to truly go “secrets-free,” and how Hush enables visibility, governance, and operability for modern and legacy environments alike.
Discover:
- The real difference between non-human identities and static keys
- Why legacy secrets management is breaking in the cloud and automation age
- Hush Security’s journey from stealth mode to active customers
- The business case for removing vaults (and the risks with “hope and prayer” key rotation)
- How to transition to policy-based access—and measurement metrics for success
- Fun discussions on pancakes vs. waffles in security leadership (really!)
Learn more about Hush Security and get a free environment assessment: hush.security/idac
Connect with Micha: https://www.linkedin.com/in/micharave/
Connect with IDAC on LinkedIn:
Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/
Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/
Visit the show on the web at idacpodcast.com
#idac #identitymanagement #machineidentity #secretsmanagement #podcast #cybersecurity #JimMcDonald #JeffSteadman #HushSecurity #IdentityattheCenter
Chapters / Timestamps:
00:00 - Welcome and Introduction (Hosts: Jeff and Jim)
01:00 - Introducing Micha Rave and Hush Security
03:00 - Micha’s Background and the Hush Team’s Journey
06:00 - What Is Hush Security and Why Now?
09:00 - Leaving Stealth Mode: Patents and Novel Approaches
12:00 - What Makes Hush Special? Remediation vs. Visibility
15:00 - Vaults vs. Secrets-Free Approach & Industry Gaps
18:00 - Non-Human Identities: Static Keys, Secrets, and Access
22:00 - Solving Problems Beyond Cloud: Custom vs. Packaged Software
26:00 - The Scale of Machine Identity in the Cloud and Automation Age
29:00 - Why Secrets Management Is Breaking and the Case for Policy-Based Access
34:00 - From Scanning to Policy Enforcement: How Hush Works
39:00 - Metrics, Success, and Executive Buy-in for Modern IAM
43:00 - How to Get Started with Hush Security (Free Assessments)
46:00 - Micha’s Conference Plans and Final Thoughts
49:00 - Pancakes or Waffles?
Keywords:
IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Hush Security, machine identity, secrets management, secrets vault, IAM, cybersecurity, sponsored episode, non-human identities, policy-based access, vault elimination, cloud security, automation, zero trust, Micha Rave, podcast, identity management