Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
What Hyperautomation Means for Identity and Data Security
November 19, 2020
What Hyperautomation Means for Identity and Data Security

Hyperautomation is a process in which businesses automate as many business and IT processes as possible using tools like AI, […]

Read More
Leaky Bucket Once Again Creates Data Breach
November 10, 2020
Leaky Bucket Once Again Creates Data Breach

Read the complete ComputerWeekly article on Prestige Software's unfortunate data breach. "AWS S3 buckets are secure by default, so in […]

Read More
Cloud Security
October 27, 2020
7 Common Data Misconfigurations for Google Cloud Platform

Seven Common Data Misconfigurations for GCP — and How to Avoid Them Just about every process in the Google Cloud […]

Read More
Avoiding Common Microsoft Azure Configuration Errors
September 1, 2020
Avoiding Common Microsoft Azure Configuration Errors

Learn the common mistakes and pitfalls DevOps and security teams commonly make when configuring Microsoft Azure.

Read More
DevSecOps Development Best Practices: More Than CI/CD
July 26, 2020
DevSecOps Development Best Practices: More Than CI/CD

Enterprises cannot afford to run blindly in the cloud, and they need to know how their cloud deployment operates. Read our blog to get best pratices for SDLC.

Read More
Misconfigured AWS S3 Bucket Leads To Data Breach
July 22, 2020
Misconfigured AWS S3 Bucket Leads To Data Breach

Misconfigured S3 bucket, an AWS cloud storage resource, linked to Magecart attacks leading to massive cloud security data breach.

Read More
Healthcare Data Security: HIPAA and the Principle of Least Privilege
July 14, 2020
Healthcare Data Security: HIPAA and the Principle of Least Privilege

Learn the the principle of least privilege and other security considerations that can help prevent privileged user abuse in healthcare.

Read More
Getting to and Maintaining the Principle of Least Privilege
July 10, 2020
Getting to and Maintaining the Principle of Least Privilege

There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations.

Read More
Hackers Held 23,000 Unsecured MongoDB Databases Ransom
July 9, 2020
Hackers Held 23,000 Unsecured MongoDB Databases Ransom

Hackers held 23k unsecured DB databases ransom from misconfigurations

Read More
Identity & IAM
June 26, 2020
Common Identity Management Blind Spots

Of all the cybersecurity threats facing organizations using the public cloud today including SMBs, one stands out above all else: […]

Read More
magnifier