Identity & IAM
CIEM vs. PAM: Know the Difference
Reading Time: 8 minutes CIEM vs. PAM: Know the Differences in the Cloud Identity Solutions With so many varying environments – cloud, on-premises, and hybrid – and numerous security priorities, there are ...
Four Steps to Securing Your Cloud
Reading Time: 6 minutes TAG Cyber and Sonrai Security have partnered to share a perspective on securing your cloud and your most critical business assets. The rapid adoption of cloud computing has ...
Understanding the Role of Identities in Cloud Breaches
Reading Time: 4 minutes Identity management has taken on an entirely new level of criticality when we evaluate it in the context of cloud environments. In fact, identities are the single connecting ...
9 Common IAM Risks & How to Mitigate Them
Reading Time: 6 minutes 9 Common IAM Risks and How To Mitigate Them If Identity and Access Management is on your mind, you’re not alone. Recognizing a weak point and seeking out ...
More Identities, More Problems, Part 2
Reading Time: 4 minutes This is part 2 from a previous blog, “More Cloud Identities, More Problems’, available here. In the first part of this blog, I addressed the reality that identities ...
More Cloud Identities, More Problems
Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past year, according to the ...
You’ve Got Identity Blindspots in Your Cloud
Reading Time: 5 minutes You’ve got identity blindspots in your cloud. It’s inevitable. But how did we get there? And what are these blindspots? The enterprise departure from on-prem datacenters to cloud ...
A Letter to the Modern CISO: Part 3
Reading Time: 4 minutes Your Cloud Can Be Deleted At Any Moment This blog is the final piece of a three-part series. The series begins here. As jarring as it sounds, your ...
A Letter to the Modern CISO: Part 1
Reading Time: 4 minutes Are You Feeling Cloud Security Imposter Syndrome? The typical cloud is likely less secure than an organization believes it is, and that is because most security professionals do ...
How To Minimize Your Cloud Breach Blast Radius
Reading Time: 5 minutes Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud ...