CISO Blog Image

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Sonrai Security has sponsored and moderated boardroom discussions with Evanta CISOs and we wanted to share our key public cloud takeaways. The post CISO Roundtable: What We’ve Heard, and What We’re Looking ...
CISO Blog Image

Security in the Cloud: IAM and Data Access Control

Identity and Access Management programming (IAM) protects your organization on two fronts: It ensures that only appropriately authorized entities (human, […] The post Security in the Cloud: IAM and Data Access Control ...
Hearing from CISOs at Google Cloud and Beyond

Hearing from CISOs at Google Cloud and Beyond

Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business at Google Cloud. However, specific security priorities vary wildly by vertical, by ...
Data breach header image for the Sonrai Security blog and webinar

IAM: A Critical Element of Corporate Risk Literacy

Risk is relative. What one person perceives is a significant risk may be observed simply as irritation to another. Others […] The post IAM: A Critical Element of Corporate Risk Literacy appeared ...

The Joy of Secure DevOps Demands More Cooks in the Kitchen

In many ways, the DevOps process looks a lot like cooking for a large dinner party—with very short notice. DevOps requires… The post The Joy of Secure DevOps Demands More Cooks in ...
next-gen CISOs

COVID-19 Gives Rise to Next-Gen CISOs

Between managing digital transformation and overseeing security in the new COVID-19 normal, are we witnessing the rise of next-gen CISOs? This hasn’t been an easy time to be a CISO. At the ...
Security Boulevard
CISO Blog Image

Why CISOs Must Let IAM Guide Cloud Security

| | CISO, Identity & IAM
CISOs must let IAM guide cloud security decisions to meet the new identity and data challenges of the public cloud. The post Why CISOs Must Let IAM Guide Cloud Security appeared first ...
Latest Public Cloud Data Breaches Affect Millions

[Webinar Recap] Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management

We recap the important information security and risk management leaders need to know when it comes to Cloud Security Posture Management (CSPM) The post [Webinar Recap] Secure Multi-Cloud Environments: Intelligent Cloud Security ...
Top Distribution Firm LOGON Software Asia and the Third-Party Application Security Vendor Reflectiz are Announcing a New Partnership

Top Distribution Firm LOGON Software Asia and the Third-Party Application Security Vendor Reflectiz are Announcing a New Partnership

Hong-Kong, / Tel-Aviv, September 30th. Hong-Kong based cyber-security solutions distributor LOGON Software Asia, and Reflectiz, a cyber security company specializing in third-party application security for websites, are pleased to announce a new ...
The Role of Identity Access Management (IAM) in Governing Cloud Security

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Security and risk management leaders need to invest in Cloud Security Posture Management tools like Intelligent CSPM The post The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture ...