Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
Achieve Visibility Across AWS, Azure & GCP
August 27, 2021
Achieve Visibility Across AWS, Azure & GCP

You can’t protect what you can’t see. Organizations making a move to the public cloud or that are already in […]

Read More
Build a Secure Cloud with Strong Data Protection
August 24, 2021
Build a Secure Cloud with Strong Data Protection

Data breaches in the cloud consistently make news headlines. Yet, the data breach stories are often vague explanations — a […]

Read More
Data Sprawl: The Cloud Data Challenge
August 18, 2021
Data Sprawl: The Cloud Data Challenge

The traditional security approach to storing and managing data is woefully inadequate for the demands of today's cloud world. Why? […]

Read More
Update on AWS re:Inforce 2021
August 13, 2021
Update on AWS re:Inforce 2021

re:Inforce 2021 Cancelled We’ve been working with our event technology partner, AWS, who has been closely monitoring the evolving situation […]

Read More
The Basics of Cloud Infrastructure Entitlement Management (CIEM)
August 12, 2021
The Basics of Cloud Infrastructure Entitlement Management (CIEM)

Understand the Need for Identity Management in the Cloud Amazon Web Services (AWS), Microsoft Azure, and Google Cloud (GCP) eliminated […]

Read More
Find, Classify, Secure: Data Recon in AWS and Azure
August 4, 2021
Find, Classify, Secure: Data Recon in AWS and Azure

In 2020, over 155.8 million individuals were affected by data exposures that revealed sensitive information because of less-than-adequate information security. For those […]

Read More
DevSecOps Security: Best Practices in Identity and Data Tools
July 27, 2021
DevSecOps Security: Best Practices in Identity and Data Tools

Identity and data security is a priority for DevSecOps in the public cloud. Accounts, access, permissions, and privileges have become […]

Read More
What Are AWS Effective Permissions?
July 15, 2021
What Are AWS Effective Permissions?

Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud.

Read More
CIEM: Yet Another Security Acronym
July 6, 2021
CIEM: Yet Another Security Acronym

Cloud Infrastructure Entitlement Management (CIEM) brings identity management to a new level. First-generation Cloud Identity Access Management (IAM) approaches do […]

Read More
How to Build a Cloud Center of Excellence
July 1, 2021
How to Build a Cloud Center of Excellence

As more enterprises move to the cloud, leading cloud service providers, like Amazon Web Services (AWS), Microsoft Azure, and Google […]

Read More
1 3 4 5 6 7 21
magnifier