Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions
September 23, 2020
The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Security and risk management leaders need to invest in Cloud Security Posture Management tools like Intelligent CSPM

Read More
Capital One Revisited: $80m Penalty From 2019 Data Breach
August 26, 2020
Capital One Revisited: $80m Penalty From 2019 Data Breach

The Office of the Comptroller of the Currency (OCC) issued a Consent Order against Capital One Bank including a civil money penalty for $80,000,000 from a data breach in 2019

Read More
Compliance
August 4, 2020
Data Governance and the COSO Cube

Accountants aren't the only financial professionals who use numbers to explain the world. The financial services sector is populated by several industries […]

Read More
From Monolith to Microservices: Security Pitfalls to Avoid
July 12, 2020
From Monolith to Microservices: Security Pitfalls to Avoid

Your application is starting to resemble the Stay-Puft Marshmallow Man in Ghostbusters. In other words, it’s a massive, lumbering monolithic […]

Read More
[Webinar Recap] Locking Down Crown-Jewel Data
June 30, 2020
[Webinar Recap] Locking Down Crown-Jewel Data

Read our webinar recap to understand how your organization can protect crown-jewel data across AWS, Azure, GCP and Kubernetes.

Read More
Enforcing Security in the Gig Economy
June 18, 2020
Enforcing Security in the Gig Economy

The gig economy is growing larger with each passing year, as companies embrace flexibility and more and more workers start […]

Read More
Four Pillars of Security Operations to De-Risk Your Cloud
June 16, 2020
Four Pillars of Security Operations to De-Risk Your Cloud

Find out how the four major pillars that determine the effectiveness and security of a cloud system can be managed to de-risk your cloud.

Read More
Identities Are Still The New Perimeter
June 2, 2020
Identities Are Still The New Perimeter

Understand the new perimeter of the modern enterprise and learn how public clouds are shifting the IAM model.

Read More
Effective Permissions: Fact vs. Fiction
May 12, 2020
Effective Permissions: Fact vs. Fiction

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Read More
The Role of Identity Access Management (IAM) in Governing Cloud Security
April 14, 2020
The Role of Identity Access Management (IAM) in Governing Cloud Security

Understand the benefits and challenges of identity and access management, a foundational security component, in the public cloud.

Read More
magnifier