Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
The Basics of Cloud Infrastructure Entitlement Management (CIEM)
August 12, 2021
The Basics of Cloud Infrastructure Entitlement Management (CIEM)

Understand the Need for Identity Management in the Cloud Amazon Web Services (AWS), Microsoft Azure, and Google Cloud (GCP) eliminated […]

Read More
Find, Classify, Secure: Data Recon in AWS and Azure
August 4, 2021
Find, Classify, Secure: Data Recon in AWS and Azure

In 2020, over 155.8 million individuals were affected by data exposures that revealed sensitive information because of less-than-adequate information security. For those […]

Read More
DevSecOps Best Practices in Identity and Data Security
July 27, 2021
DevSecOps Best Practices in Identity and Data Security

Identity and data security is a priority for DevSecOps in the public cloud. Accounts, access, permissions, and privileges have become […]

Read More
What Are AWS Effective Permissions?
July 15, 2021
What Are AWS Effective Permissions?

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Read More
CIEM: Yet Another Security Acronym
July 6, 2021
CIEM: Yet Another Security Acronym

Cloud Infrastructure Entitlement Management (CIEM) brings identity management to a new level. First-generation Cloud Identity Access Management (IAM) approaches do […]

Read More
How to Build a Cloud Center of Excellence
July 1, 2021
How to Build a Cloud Center of Excellence

As more enterprises move to the cloud, leading cloud service providers, like Amazon Web Services (AWS), Microsoft Azure, and Google […]

Read More
DevSecOps: Cloud Security Approach For Public Cloud
June 25, 2021
DevSecOps: Cloud Security Approach For Public Cloud

DevSecOps is a new approach to security in which organizations are held accountable for the decisions they make in the […]

Read More
What is CIEM and Why Cloud Security Teams Should Make it a Priority
June 24, 2021
What is CIEM and Why Cloud Security Teams Should Make it a Priority

CIEM refers to next-generation cloud security technology that grants, resolves, enforces, revokes, and administers access.

Read More
Leaky Database Exposes 5B Records
June 20, 2021
Leaky Database Exposes 5B Records

In the latest data disaster, a database owned by a cybersecurity analytics firm leaked 5 billion records, exposing names, passwords, and […]

Read More
Healthcare Retailer Accidentally Leaks 1B Records
June 19, 2021
Healthcare Retailer Accidentally Leaks 1B Records

The number of major corporations experiencing crippling security breaches is on the rise. Recent data breach statistics show how highly motivated bad […]

Read More
magnifier