CIEM BUYERS GUIDE

CIEM vs. PAM: Know the Difference

Reading Time: 8 minutes CIEM vs. PAM: Know the Differences in the Cloud Identity Solutions With so many varying environments – cloud, on-premises, and hybrid – and numerous security priorities, there are ...
tag blog 2

Four Steps to Securing Your Cloud

Reading Time: 6 minutes TAG Cyber and Sonrai Security have partnered to share a perspective on securing your cloud and your most critical business assets. The rapid adoption of cloud computing has ...
tag blog 2

Understanding the Role of Identities in Cloud Breaches

Reading Time: 4 minutes Identity management has taken on an entirely new level of criticality when we evaluate it in the context of cloud environments. In fact, identities are the single connecting ...
identity and access

9 Common IAM Risks & How to Mitigate Them

Reading Time: 6 minutes 9 Common IAM Risks and How To Mitigate Them If Identity and Access Management is on your mind, you’re not alone. Recognizing a weak point and seeking out ...
Sonrai Expert Series: Excessive vs Effective Permissions

More Identities, More Problems, Part 2

| | ciem, Identity & IAM
Reading Time: 4 minutes This is part 2 from a previous blog, “More Cloud Identities, More Problems’, available here. In the first part of this blog, I addressed the reality that identities ...
Sonrai Expert Corner: Identity Proliferation

More Cloud Identities, More Problems

Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past year, according to the ...
Sonrai Expert Corner: Matt Carle

You’ve Got Identity Blindspots in Your Cloud

Reading Time: 5 minutes You’ve got identity blindspots in your cloud. It’s inevitable. But how did we get there? And what are these blindspots? The enterprise departure from on-prem datacenters to cloud ...
1 in 10 identities can delete your cloud

A Letter to the Modern CISO: Part 3

Reading Time: 4 minutes Your Cloud Can Be Deleted At Any Moment This blog is the final piece of a three-part series. The series begins here.  As jarring as it sounds, your ...
cloud ciso osterman research

A Letter to the Modern CISO: Part 1

| | CISO, Identity & IAM
Reading Time: 4 minutes Are You Feeling Cloud Security Imposter Syndrome? The typical cloud is likely less secure than an organization believes it is, and that is because most security professionals do ...
AWS re:Invent 2018: How AWS Minimizes the Blast Radius of Failures (ARC338)

How To Minimize Your Cloud Breach Blast Radius

Reading Time: 5 minutes Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud ...