Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
The Secret Behind Least Privilege: CIEM
September 21, 2021
The Secret Behind Least Privilege: CIEM

Most employees have access entitlements they don’t need and probably shouldn’t have. Few people are going to willingly give up […]

Read More
Achieve Visibility Across AWS, Azure & GCP
August 27, 2021
Achieve Visibility Across AWS, Azure & GCP

You can’t protect what you can’t see. Organizations making a move to the public cloud or that are already in […]

Read More
Data Sprawl: The Cloud Data Challenge
August 18, 2021
Data Sprawl: The Cloud Data Challenge

The traditional security approach to storing and managing data is woefully inadequate for the demands of today's cloud world. Why? […]

Read More
What Are AWS Effective Permissions?
July 15, 2021
What Are AWS Effective Permissions?

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Read More
DevSecOps: Cloud Security Approach For Public Cloud
June 25, 2021
DevSecOps: Cloud Security Approach For Public Cloud

DevSecOps is a new approach to security in which organizations are held accountable for the decisions they make in the […]

Read More
Supermarket Suffers Database Misconfiguration
June 17, 2021
Supermarket Suffers Database Misconfiguration

Grocery chain Wegmans recently suffered a data breach exposing customer names, passwords, addresses, and dates of birth. The culprit? Two […]

Read More
Cloud Drift Leads to Data Loss for FinTechs
June 8, 2021
Cloud Drift Leads to Data Loss for FinTechs

Cloud computing has modernized the way financial organizations build, operate, and manage infrastructure and applications. Cloud computing has helped financial […]

Read More
Manual Security Audits vs. Continuous Audits
April 13, 2021
Manual Security Audits vs. Continuous Audits

To meet multi-cloud security challenges, continuous audit is becoming the best process over manual security audit.

Read More
Share the Responsibility to Avoid A Data Breach
March 30, 2021
Share the Responsibility to Avoid A Data Breach

Gain a detailed understanding of the shared responsibility model requirements, which differ by CSP.

Read More
Microsoft Azure Checklist: Expert Advice on Security
March 28, 2021
Microsoft Azure Checklist: Expert Advice on Security

Key takeaways from our recent webinar on Microsoft Azure cloud security  As we discussed in a recent webinar on Microsoft Azure security […]

Read More
1 2 3 5
magnifier