Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
Getting to and Maintaining the Principle of Least Privilege
July 10, 2020
Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Read More
Cloud Complexities Create Chaos
June 23, 2020
Cloud Complexities Create Chaos

Understand and better manage your organizations sensitive data by reducing the complexity of your public cloud data and identity access.

Read More
Enforcing Security in the Gig Economy
June 18, 2020
Enforcing Security in the Gig Economy

The gig economy is growing larger with each passing year, as companies embrace flexibility and more and more workers start […]

Read More
Lessons We Learned From The CIA Data Breach
June 17, 2020
Lessons We Learned From The CIA Data Breach

In the wake of the largest data breach in CIA history, we cover some key learnings on information security for the future.

Read More
Four Pillars of Security Operations to De-Risk Your Cloud
June 16, 2020
Four Pillars of Security Operations to De-Risk Your Cloud

Find out how the four major pillars that determine the effectiveness and security of a cloud system can be managed to de-risk your cloud.

Read More
[Webinar Recap] Achieving and Maintaining Least Privilege
June 9, 2020
[Webinar Recap] Achieving and Maintaining Least Privilege

Read our webinar recap to understand how your organization can get to and maintain the Principle of Least Privilege.

Read More
[Webinar Recap] Identity Security & Secrets Management: Key to Unlocking Public Cloud Security
April 22, 2020
[Webinar Recap] Identity Security & Secrets Management: Key to Unlocking Public Cloud Security

Missed our webinar? Don’t worry. We breakdown the key takeaways from the identity security and secrets management with HashiCorp Vault.

Read More
The Role of Identity Access Management (IAM) in Governing Cloud Security
April 14, 2020
The Role of Identity Access Management (IAM) in Governing Cloud Security

Understand the benefits and challenges of identity and access management, a foundational security component, in the public cloud.

Read More
How to Determine Your Blast Radius
April 2, 2020
How to Determine Your Blast Radius

Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud

Read More
5 IAM Trends To Watch In 2020
March 17, 2020
5 IAM Trends To Watch In 2020

Understand the top 5 Identity and Access Management trends emerging in 2020 and learn what you can do to implement them today.

Read More
magnifier