Identity Governance and Administration (IGA): Is it enough?

Identity Governance and Administration (IGA): Is it enough?

Reading Time: 11 minutes According to the Identity Defined Security Alliance (IDSA)’s study, ”Identity Security: A Work in Progress,” 94% of organizations experienced a data breach, and 79% were breached in the last two years. While managing identities may seem straightforward, they are the most significant risks to cloud environments ... Read More
Diagram of the disciplines of Management in Azure.

What is Azure Governance and its management areas?

Reading Time: 9 minutes Introduction to Azure Cloud Governance As with any new technology, it is vital to have the proper cloud governance in place when using Microsoft Azure. The cloud offers many benefits and advantages. Still, if an organization does not correctly implement its frameworks, it will be at ... Read More
Data Security with Sonrai Dig

13 Data Governance Best Practices

Reading Time: 8 minutes The global cloud computing market will grow by $461 billion by the last quarter of 2025, according to predictions. With the cloud adoption rate increasing and well over half of the organizations using multiple public clouds, it’s clear that enterprise organizations will depend on public cloud ... Read More
Data loss prevention policy_Image

9 Steps to Create a Data Loss Prevention Policy

Reading Time: 9 minutes According to Gartner, through 2025, 90% of the organizations that fail to control public cloud use will inappropriately share sensitive data. The real challenge exists not in the security of the cloud itself but in the policies for security and control of the infrastructure and data ... Read More
Cloud Security Horror Stories

Anti-Vax Dating App Offers Up Admin Privileges

Reading Time: 3 minutes Recently, a dating app dedicated to pairing up anti-vaccination individuals experienced massive data exposure due to an alleged ‘hasty set-up’ and absence of basic security protocols. The dating app, Unjected, allowed access to the admin dashboard, which had been left entirely unsecured and in debug mode ... Read More
Failed Cloud Security Strategy Haunts Hotel Chain

Failed Cloud Security Strategy Haunts Hotel Chain

| | Data breach
Reading Time: 3 minutes One of the largest hotel conglomerates in the world experienced another data breach, this time potentially affecting up to 400 individuals and 20GB. In recent years, the hotel chain has had a history of losing customer data to hackers creating massive amounts of data loss, large ... Read More
Anonymous Threat Actor Steals 1 Billion Citizens Records

Anonymous Threat Actor Steals 1 Billion Citizens Records

| | Data breach
Reading Time: 2 minutes The leak of 1 billion Chinese nationals’ personal details is just the latest in a series of cloud security data breaches. A misconfigured server has led to the leak of around 1 billion Chinese nationals’ personal details.  “ChinaDan,” an anonymous threat actor, posted an advertisement on ... Read More
Capital One Data Breach Update: Former Amazon Engineer Convicted

Capital One Data Breach Update: Former Amazon Engineer Convicted

Reading Time: 4 minutes The Office of the Comptroller of the Currency (OCC) issued a Consent Order against Capital One Bank including a civil money penalty for $80,000,000 from a data breach in 2019 ... Read More
iam tools

Pick the Best Identity Access Management (IAM) Tools for Your Cloud

Reading Time: 8 minutes Traditional IT security must be reimagined when approaching cloud security, and that includes the strategy around IAM tools. Defining an “identity” in the cloud goes beyond users to pieces of compute, serverless functions, machines, and more. We’re seeing a renewed focus on IAM due to the ... Read More

Marketing Operations Manager

| | Uncategorized
Sonrai Security, a cloud-based security company, is looking for a Marketing Operations Manager to join our team. As the steward […] The post Marketing Operations Manager appeared first on Sonrai Security ... Read More
Loading...