Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  Sonrai Security technology Blog  > 

Sonrai Security Blog


sonraisecurity.com/blog
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organization’s public cloud. Dig’s Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security. Our blog shares expert advise for DevSecOps, DevOps, Cloud Security, and Cloud teams. For more information, visit https://sonraisecurity.com/
Defining A Cloud Permissions Firewall
2024-04-10 12:59
Sonrai recently launched the first-ever Cloud Permissions Firewall – a new class of solution built to more efficiently protect sensitive permissions and access.  A new solution… Read More
2023-12-13 16:40
Amazon Web Services (AWS) S3, or Simple Storage Service, is a highly scalable object storage service that allows businesses to store and retrieve any amount of data. S3 permissions are the e… Read More
2023-12-07 13:11
What is Azure Policy? Azure Policy is a service within Microsoft Azure that allows organizations to create, assign, and manage policies. These policies define rules and effects over reso… Read More
2023-10-25 11:29
Reading Time: 6 minutes After months of offering our Cloud Identity Diagnostic – a report detailing what identity and privilege risks are leaving organizations vulnerable to data brea… Read More
2023-08-16 13:23
Reading Time: 6 minutes A cloud security risk assessment is an analysis of an organization’s cloud infrastructure to determine its security posture. This is a critical process for any… Read More
2023-07-28 16:05
Reading Time: 7 minutes If you’re reading this, you might be considering a cloud security solution – maybe an identity and permissions-focused one – maybe even Sonrai… Read More
2023-07-25 14:40
Reading Time: 8 minutes CIEM vs. PAM: Know the Differences in the Cloud Identity Solutions With so many varying environments – cloud, on-premises, and hybrid – and numerous s… Read More
2023-06-22 18:05
Reading Time: 6 minutes TAG Cyber and Sonrai Security have partnered to share a perspective on securing your cloud and your most critical business assets. The rapid adoption of cloud com… Read More
2023-05-30 16:21
Reading Time: 6 minutes 9 Common IAM Risks and How To Mitigate Them If Identity and Access Management is on your mind, you’re not alone. Recognizing a weak point and seeking out st… Read More
2023-05-04 16:48
Reading Time: 4 minutes Meeting cloud compliance standards and passing audits is the pain point every enterprise has, but no one wants. Compliance frameworks do right by your enterprise… Read More
2023-04-03 14:50
Reading Time: 4 minutes This is part 2 from a previous blog, “More Cloud Identities, More Problems’, available here. In the first part of this blog, I addressed the reality t… Read More
2023-03-27 13:25
Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past… Read More
2023-03-13 16:49
Reading Time: 4 minutes Your Cloud Can Be Deleted At Any Moment This blog is the final piece of a three-part series. The series begins here.  As jarring as it sounds, your cloud… Read More
2023-03-09 14:22
Reading Time: 5 minutes You ‘Shifted Left’ off a Cliff This blog is the second piece of a three-part series. The first blog is available here. Your organization has shifte… Read More
2023-03-07 14:09
Reading Time: 4 minutes Are You Feeling Cloud Security Imposter Syndrome? The typical cloud is likely less secure than an organization believes it is, and that is because most security p… Read More
2023-03-02 20:18
Reading Time: 5 minutes Lessons from the LastPass Breach  Below we’ll detail the latest LastPass incident, discuss the implications of this attack, and finally recommend how o… Read More
2022-10-26 20:19
Reading Time: 4 minutes In the early days of risk detection, if your security team wanted an intimate understanding of their on-prem infrastructure and means to secure it, they needed to br… Read More
2022-10-04 14:58
Reading Time: 9 minutes Cybercrime Runs Rampant Cybercrime is not slowing down for anyone. In fact, Q2 of 2022 saw a 32% increase in global cyberattacks YoY. This brought the weekly atta… Read More
2022-09-27 17:41
Reading Time: 7 minutes Today, Identity and Access Management is at the forefront of security strategies in the cloud, as organizations big and small migrate to this new frontier. Howev… Read More
2022-09-20 15:49
Reading Time: 7 minutes In today’s fast-moving cloud workload security environments, decision-makers are grappling with misconfigurations and vulnerabilities in the cloud. Good vulner… Read More
2022-09-19 16:52
Reading Time: 5 minutes So your company is now operating in the cloud. It’s exciting, isn’t it?  So many tools at your disposal, so many new ways to get things done, and pu… Read More
Uber Data Breach Is Worst Case Scenario
2022-09-17 17:27
Reading Time: 6 minutes On Thursday, September 15, Uber, the ride-sharing giant, had a security incident after reports claimed a hacker had breached its internal network. Uber joins the ran… Read More
2022-09-15 05:18
Reading Time: 8 minutes As your organization grows, so does your reliance on cloud services. But with that growth comes the risk of cloud sprawl — when too many cloud services are add… Read More
2022-09-08 19:32
Reading Time: 5 minutes Organizations are increasingly moving their operations to the cloud and Microsoft Azure is one of the most popular platforms for cloud computing. However, while… Read More
2022-09-01 15:57
Reading Time: 6 minutes With 84% of companies experiencing an identity-related breach in the previous year, you’re making the right choice by seeking out azure identity governance and… Read More
2022-08-29 18:15
Reading Time: 5 minutes We all remember the SolarWinds attack taking up residency in the media headlines back in 2020. If you don’t remember it, in short, the company was targeted by… Read More
2022-08-23 10:30
Reading Time: 8 minutes There’s no question that AWS Lambda remains the incumbent leader for serverless computing. Lambda’s recent enhancements, including the ability to allocat… Read More
2022-08-18 15:13
Reading Time: 8 minutes The global cloud computing market will grow by $461 billion by the last quarter of 2025, according to predictions. With the cloud adoption rate increasing and well o… Read More
2022-07-27 01:12
Reading Time: 6 minutes The unstoppable forces of cloud and agile development are driving momentous changes in how enterprises build, deploy, and run applications. All in all, the cloud has… Read More

Share the post

Sonrai Security

×

Subscribe to Sonrai Security

Get updates delivered right to your inbox!

Thank you for your subscription

×