Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
CIEM: Yet Another Security Acronym
July 6, 2021
CIEM: Yet Another Security Acronym

Cloud Infrastructure Entitlement Management (CIEM) brings identity management to a new level. First-generation Cloud Identity Access Management (IAM) approaches do […]

Read More
How to Build a Cloud Center of Excellence
July 1, 2021
How to Build a Cloud Center of Excellence

As more enterprises move to the cloud, leading cloud service providers, like Amazon Web Services (AWS), Microsoft Azure, and Google […]

Read More
What is CIEM and Why Cloud Security Teams Should Make it a Priority
June 24, 2021
What is CIEM and Why Cloud Security Teams Should Make it a Priority

CIEM refers to next-generation cloud security technology that grants, resolves, enforces, revokes, and administers access.

Read More
WFS Changes Technology Approach
June 18, 2021
WFS Changes Technology Approach

Event Recap: Sandy Bird, Co-Founder & CTO of Sonrai Security, participated in an AWS showcase for cloud-scale data leaders.

Read More
Webinar Recap: The Challenge of Non-People Identities
May 19, 2021
Webinar Recap: The Challenge of Non-People Identities

Did you miss our recent non-people identity webinar series? This three-part webinar highlighted crucial cloud security elements about managing non-people […]

Read More
An Overview of the Best Cloud Security Platform: Sonrai Dig
May 12, 2021
An Overview of the Best Cloud Security Platform: Sonrai Dig

The rapid adoption of cloud technologies has introduced numerous new challenges for Security, Compliance & Audit, and DevOps teams. Although cloud platforms, like AWS, Microsoft Azure and Google Cloud Platform (GCP), introduce substantial operational benefits, they also introduce new challenges for an organization's ability to secure data in the cloud and meet ever-increasing regulatory burdens.

Read More
The Benefits of Conducting Identity Access Reviews
April 6, 2021
The Benefits of Conducting Identity Access Reviews

To effectively manage identity and access in public cloud, enterprises should conduct an access review.

Read More
Share the Responsibility to Avoid A Data Breach
March 30, 2021
Share the Responsibility to Avoid A Data Breach

Gain a detailed understanding of the shared responsibility model requirements, which differ by CSP.

Read More
Sonrai Dig Wins Product of the Year Award
March 27, 2021
Sonrai Dig Wins Product of the Year Award

TMC, a global, integrated media company helping clients build communities in print, in-person, and online, today announced Sonrai Dig as […]

Read More
Cloud Security for Non-Human Serverless Identities
March 23, 2021
Cloud Security for Non-Human Serverless Identities

The serverless model shifts security focus to identities, effective permissions, and data access.

Read More
magnifier