Sonrai Security website logo for identity and data governance and cloud security

Blog Posts By  Eric Kedrosky

CISO
October 7, 2020
Why CISOs Must Let IAM Guide Cloud Security

CISOs must let IAM guide cloud security decisions to meet the new identity and data challenges of the public cloud.

Read More
CISO
September 23, 2020
The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Security and risk management leaders need to invest in Cloud Security Posture Management tools like Intelligent CSPM

Read More
Compliance
September 1, 2020
Avoiding Common Microsoft Azure Configuration Errors

Learn the common mistakes and pitfalls DevOps and security teams commonly make when configuring Microsoft Azure.

Read More
Audit & Compliance
August 26, 2020
Capital One Revisited: $80m Penalty From 2019 Data Breach

The Office of the Comptroller of the Currency (OCC) issued a Consent Order against Capital One Bank including a civil money penalty for $80,000,000 from a data breach in 2019

Read More
CISO
July 29, 2020
New CISO Priorities of 2020

Projects that were high priorities before the WFH era have taken a back seat to new business needs as CISOs shift focus halfway through 2020.

Read More
Data Breach
July 24, 2020
Attackers Find AWS S3 Bucket With 17m Users

CouchSurfing is an online service that lets users find free lodgings around the world. Currently the company is investigating a […]

Read More
CISO
July 22, 2020
What is Shift Left Testing?

Learn how to incorporate security earlier in your cloud development process by shifting left to integrate teams.

Read More
Data Breach
July 22, 2020
Misconfigured AWS S3 Bucket Leads To Data Breach

Misconfigured S3 bucket, an AWS cloud storage resource, linked to Magecart attacks leading to massive cloud security data breach.

Read More
CISO
July 12, 2020
From Monolith to Microservices: Security Pitfalls to Avoid

Your application is starting to resemble the Stay-Puft Marshmallow Man in Ghostbusters. In other words, it’s a massive, lumbering monolithic […]

Read More
Compliance
July 10, 2020
Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Read More
magnifier