<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Hut Academy - Training Service]]></title><description><![CDATA[Regular bitesize training and cheat sheets for the key topics, acronyms and themes in the global identity security - in 10 mins or less.]]></description><link>https://academy.thecyberhut.com</link><image><url>https://substackcdn.com/image/fetch/$s_!LgyR!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png</url><title>The Cyber Hut Academy - Training Service</title><link>https://academy.thecyberhut.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 21 Apr 2026 17:32:31 GMT</lastBuildDate><atom:link href="https://academy.thecyberhut.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Cyber Hut]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[iambitesize@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[iambitesize@substack.com]]></itunes:email><itunes:name><![CDATA[The Cyber Hut]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Cyber Hut]]></itunes:author><googleplay:owner><![CDATA[iambitesize@substack.com]]></googleplay:owner><googleplay:email><![CDATA[iambitesize@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Cyber Hut]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[39: What is Just in Time access and Zero Standing Privileges?]]></title><description><![CDATA[Regular bitesize training and cheat sheets for the key topics, acronyms and themes in the global identity security - in 10 mins or less.]]></description><link>https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 26 Feb 2026 12:57:36 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e018e74d-6e35-4c51-a87c-8bcd261c6074_842x841.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Audio Cast:</h3><div class="native-audio-embed" data-component-name="AudioPlaceholder" data-attrs="{&quot;label&quot;:null,&quot;mediaUploadId&quot;:&quot;dff94ee3-6703-4b0c-aade-313db3cee68e&quot;,&quot;duration&quot;:599.4841,&quot;downloadable&quot;:false,&quot;isEditorNode&quot;:true}"></div><h3>Takeaway Points:</h3><ul><li><p>Just-in-Time (JIT) access is a modern approach to access management </p></li><li><p>The idea being access is granted to a resource only when it is <strong>explicitly</strong> needed -  and only for the <strong>specific</strong> <strong>duration</strong> required.</p></li><li><p>That &#8220;time&#8221; aspect could be explicit - with access given for 10 minutes, or more <strong>contextual</strong>. For example access is linked to a service ticket and is granted until the ticket is closed.</p></li><li><p>Key aspects of JIT access:</p><ul><li><p><strong>Principle:</strong> It allows identities to request access <em>only when needed</em> and <em>only for as long as needed</em>.</p></li><li><p><strong>Goal:</strong> It is critical for minimizing the <strong>identity attack surface</strong> and enforcing a <strong>least-privilege principle</strong>.</p></li><li><p><strong>Context:</strong> It is part of a strategic shift toward an <strong>Identity-Native, API-first model</strong> to secure high risk systems, modern production infrastructure and modern privileged access management (PAM) systems.</p></li></ul></li><li><p>This concept is often paired with <strong>Zero Standing Privileges (ZSP)</strong></p></li><li><p>ZSP relates to accounts having no permanent access rights - no existing provisioning exists.</p></li><li><p>Key aspects of ZSP:</p><ul><li><p><strong>Core Principle:</strong> It means that a user, machine, or service has <strong>no permanent user access permissions</strong> to a resource.</p></li><li><p><strong>Mechanism:</strong> When access is needed, it is dynamically granted using a &#8220;Just-in-Time&#8221; (JIT) approach, which provides access only for the specific task and time required.</p></li><li><p><strong>Benefit:</strong> The implementation of ZSP holds promise to <strong>reduce risk</strong> by significantly minimizing the identity attack surface. In essence, adversaries cannot exploit standing privileges if those privileges do not exist in a permanent state.</p></li></ul></li><li><p>How to implement? This depends on whether existing or new accounts and permissions are under analysis.</p></li><li><p>Essentially some key concepts need to be considered:</p><ul><li><p>inventory creation of accounts and permissions</p></li><li><p>identify and analysis risk</p></li><li><p>automated removal of unused access</p></li><li><p>access request functions for gaining access via policy</p></li><li><p>manage approvals and removal post usage</p><p></p></li></ul></li></ul><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://academy.thecyberhut.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Hut Academy - Training Service is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Black Friday 2025 - 20% Off Training Back Catalog]]></title><description><![CDATA[Available until Monday 1st December]]></description><link>https://academy.thecyberhut.com/p/black-friday-2025-20-off-training</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/black-friday-2025-20-off-training</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 28 Nov 2025 16:53:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8535e438-65d5-41f7-9bb8-a6e08bee6732_816x558.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/black-friday-2025-20-off-training">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[38: How does Identity and Access Management relate to Zero Trust?]]></title><link>https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 20 Nov 2025 11:54:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ad098ffa-32d2-4593-81c0-4c932b49726f_642x273.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[37: What is Identity Risk Management?]]></title><link>https://academy.thecyberhut.com/p/37-what-is-identity-risk-management</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/37-what-is-identity-risk-management</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 02 Oct 2025 10:38:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f3d21e1d-0e4f-4509-a54c-6d09322eb96e_827x775.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/37-what-is-identity-risk-management">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[36: What is Identity Data Management?]]></title><link>https://academy.thecyberhut.com/p/36-what-is-identity-data-management</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/36-what-is-identity-data-management</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 04 Sep 2025 11:01:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e53074f0-8cd6-41cb-b22b-6ca4c2391f92_784x696.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/36-what-is-identity-data-management">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[35: What are Initial Access Brokers?]]></title><link>https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Wed, 13 Aug 2025 11:26:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4e905d25-bcb4-4f50-bc24-cbf6cae4e4a4_806x603.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[34: What is SPIFFE?]]></title><link>https://academy.thecyberhut.com/p/34-what-is-spiffe</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/34-what-is-spiffe</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 03 Jul 2025 13:59:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fd98084f-9aec-4708-b6f7-a9b5d84a4eb0_809x765.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/34-what-is-spiffe">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[33: What Role does AI play in IAM?]]></title><link>https://academy.thecyberhut.com/p/33-what-role-does-ai-play-in-iam</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/33-what-role-does-ai-play-in-iam</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 05 Jun 2025 13:37:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ecffbc4a-cc55-46a5-84e1-7933c1132386_776x697.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/33-what-role-does-ai-play-in-iam">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[32: What is a Device Fingerprint?]]></title><link>https://academy.thecyberhut.com/p/32-what-is-a-device-fingerprint</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/32-what-is-a-device-fingerprint</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 24 Apr 2025 11:14:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/734ab112-aaed-4ebd-bac0-df1ebd3cd058_740x711.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/32-what-is-a-device-fingerprint">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[31: What is Continuous Authentication?]]></title><link>https://academy.thecyberhut.com/p/31-what-is-continuous-authentication</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/31-what-is-continuous-authentication</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 13 Mar 2025 11:28:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6cb101c3-b16a-4af1-b617-68a99750c380_772x642.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/31-what-is-continuous-authentication">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[30: What are Separation of Duties?]]></title><link>https://academy.thecyberhut.com/p/30-what-are-separation-of-duties</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/30-what-are-separation-of-duties</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 30 Jan 2025 10:27:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/db91f2e0-293d-48f8-a3c8-fd674a0f117c_819x457.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/30-what-are-separation-of-duties">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[29: What is Session Management?]]></title><link>https://academy.thecyberhut.com/p/29-what-is-session-management</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/29-what-is-session-management</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Wed, 15 Jan 2025 15:23:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8f026f71-fa47-46ac-ae89-c0a7d3f2bac8_780x627.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/29-what-is-session-management">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[28: What is Identity Threat Detection and Response?]]></title><link>https://academy.thecyberhut.com/p/28-what-is-identity-threat-detection</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/28-what-is-identity-threat-detection</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Wed, 20 Nov 2024 12:34:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4235b2c9-445f-445a-a118-6fd2efaa1ba4_935x687.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/28-what-is-identity-threat-detection">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Study Guide: B2C CIAM]]></title><description><![CDATA[Regular bitesize explanations and discussion on the key topics, acronyms and themes in the global identity and access management industry, in 5 mins or less.]]></description><link>https://academy.thecyberhut.com/p/study-guide-b2c-ciam</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/study-guide-b2c-ciam</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 03 Oct 2024 09:05:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d70185c0-a0f8-454d-ac35-2b4ccee2fea5_821x563.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The following resources are taken from the Amazon published book, <a href="https://www.amazon.co.uk/Consumer-Identity-Access-Management-Fundamentals-ebook/dp/B08VHDFNN1/ref=sr_1_1?crid=1UJU85KSSG6BU&amp;dib=eyJ2IjoiMSJ9.u8ryX3FDAqTMv71J1J-YlXW0Iab5l8CtDLb29oSd4YJyQPYRQLiPP3ultJt61iJqjib1zvk5tPAdaf6dsWUO9J_4H03kAt1La3225aQfHYbejhHRMWTu01DcL2nQ9MGFb_6Oigh6dkuqUyjc1AiOYQ5T5OwSsl2hcTT7W6bFoDmDdA2ofiXPuAW3kK9jPlifvXC_-cg5ys3AtneoxQ5Wlms-P5AnwXl-R6P_3e_kXbE.YfUwIOkFVtW5mHSq2UHfLH8PqpVewhl_VdLQPy9NMBQ&amp;dib_tag=se&amp;keywords=customer+identity+and+access+management&amp;nsdOptOutParam=true&amp;qid=1727942201&amp;sprefix=customer+identity+%2Caps%2C113&amp;sr=8-1">Consumer Identity and Access Management Design Fundamentals</a>.</p><h2>Introduction</h2><p><strong>Simon Moffatt's "Consumer Identity &amp; Access Management: Design Fundamentals"</strong> explains the essential concepts of CIAM (Consumer Identity and Access Management), highlighting its differences from IAM (Identity and Access Management). It explores the evolution of identity management, discussing the shift from employee-centric systems to a consumer-focused approach. </p><p>The text also delves into key CIAM requirements, emphasizing the importance of user experience, security, privacy, and compliance. It provides a detailed overview of the CIAM lifecycle, including onboarding, proofing, secure login, device binding, contextual and adaptive access, profile management, consent management, data management, and account removal. </p><p>Furthermore, the document presents a technical toolbox for CIAM implementers, outlining key cryptographic concepts, standards, and libraries, such as OAuth2, REST, and FIDO2. It concludes with considerations for vendor selection, KPI (Key Performance Indicator) development, and metrics related to data breach prevention, stressing the importance of aligning CIAM initiatives with business objectives.</p><div><hr></div><h2>Audiocast Interview</h2><p>The following is a NotebookLM generated conversation discussing the book and the role of B2C identity.</p><div class="native-audio-embed" data-component-name="AudioPlaceholder" data-attrs="{&quot;label&quot;:null,&quot;mediaUploadId&quot;:&quot;48adda4d-8cdf-4438-87b7-9dc4a21bce52&quot;,&quot;duration&quot;:716.0424,&quot;downloadable&quot;:false,&quot;isEditorNode&quot;:true}"></div><div><hr></div>
      <p>
          <a href="https://academy.thecyberhut.com/p/study-guide-b2c-ciam">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[27: What is the Role of Cryptography within IAM?]]></title><link>https://academy.thecyberhut.com/p/27-what-is-the-role-of-cryptography</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/27-what-is-the-role-of-cryptography</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Fri, 20 Sep 2024 09:18:20 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ed0326c6-f5cf-4fa6-9440-b3c3e1a81241_783x711.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/27-what-is-the-role-of-cryptography">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[26: What are the NIST 800-63 Identity Guidelines?]]></title><description><![CDATA[Regular bitesize explanations and discussion on the key topics, acronyms and themes in the global identity and access management industry, in 5 mins or less.]]></description><link>https://academy.thecyberhut.com/p/26-what-are-the-nist-800-63-identity</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/26-what-are-the-nist-800-63-identity</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 12 Sep 2024 12:38:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5e05ea4b-61b1-4ca1-abf7-108d9dfd7b4b_822x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/26-what-are-the-nist-800-63-identity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[25: What is a OTP?]]></title><link>https://academy.thecyberhut.com/p/25-what-is-a-otp</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/25-what-is-a-otp</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Thu, 05 Sep 2024 10:48:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ccb9620c-c0e3-4509-b36d-3c55a9df7e3e_831x743.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/25-what-is-a-otp">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[24: What is Consent Management?]]></title><description><![CDATA[Regular bitesize explanations and discussion on the key topics, acronyms and themes in the global identity and access management industry, in 5 mins or less.]]></description><link>https://academy.thecyberhut.com/p/24-what-is-consent-management</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/24-what-is-consent-management</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Tue, 20 Aug 2024 12:09:28 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bc82b3ba-2ecd-42d3-b06f-6a2d2f2fa187_737x525.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/24-what-is-consent-management">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[23: What is FIDO?]]></title><link>https://academy.thecyberhut.com/p/23-what-is-fido</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/23-what-is-fido</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Wed, 24 Jul 2024 11:05:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LgyR!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/23-what-is-fido">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[22: A Primer on Biometric Authentication]]></title><link>https://academy.thecyberhut.com/p/22-a-primer-on-biometric-authentication</link><guid isPermaLink="false">https://academy.thecyberhut.com/p/22-a-primer-on-biometric-authentication</guid><dc:creator><![CDATA[The Cyber Hut]]></dc:creator><pubDate>Wed, 19 Jun 2024 11:20:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LgyR!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef8056ca-aa12-4401-b02e-ad4f183f5eeb_300x300.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[
      <p>
          <a href="https://academy.thecyberhut.com/p/22-a-primer-on-biometric-authentication">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>