Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
Data Breach Is Result Of A Failed Cloud Security Strategy
April 2, 2020
Data Breach Is Result Of A Failed Cloud Security Strategy

Marriott International, one of the largest hotel conglomerates in the world, experienced a massive cloud security data breach.

Read More
How to Determine Your Blast Radius
April 2, 2020
How to Determine Your Blast Radius

Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud

Read More
Integration with IBM QRadar Provides Complete End-to-End Visibility
March 31, 2020
Integration with IBM QRadar Provides Complete End-to-End Visibility

Sonrai Security announces our new integration with IBM® QRadar® to help organizations access improved security findings from their application workloads […]

Read More
Google Cloud Deep Dive
March 26, 2020
Google Cloud Deep Dive

Understand the top security considerations for Google Cloud.

Read More
5 IAM Trends To Watch In 2020
March 17, 2020
5 IAM Trends To Watch In 2020

Understand the top 5 Identity and Access Management trends emerging in 2020 and learn what you can do to implement them today.

Read More
3 Cloud Security Takeaways From RSA 2020
March 10, 2020
3 Cloud Security Takeaways From RSA 2020

We review the top three cloud security takeaways from RSA 2020.

Read More
AWS IAM Breakdown… and common mistakes (Cont.)
February 25, 2020
AWS IAM Breakdown… and common mistakes (Cont.)

We focus on common AWS accounts common mistakes and overlooked IAM security best practices.

Read More
Cloud Security
February 3, 2020
RSA 2020

Join us at RSA 2020 conference in San Francisco. Come visit us at the Early Stage Expo and get a demo of our cutting edge IAM technology.

Read More
Cloud Security Considerations for AWS, Azure, & Google
January 28, 2020
Cloud Security Considerations for AWS, Azure, & Google

Review the pros and cons of AWS, Microsoft Azure and Google Cloud to understand the top considerations in a modern enterprise.

Read More
3 Security Considerations for Multi-Cloud
December 10, 2019
3 Security Considerations for Multi-Cloud

Understand the top three considerations for securing a multi-cloud environment, as well as key requirements for cloud security.

Read More
magnifier