Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

The desire to quickly deploy and maintain third-party tools often leads organizations to grant broad, sometimes excessive permissions in their cloud environments. While this is convenient for onboarding and operations, it creates ...
"Deny All" for Public Buckets: AWS Resource Control Policies (RCP) Extend Centralized Cloud Governance

“Deny All” for Public Buckets: AWS Resource Control Policies (RCP) Extend Centralized Cloud Governance

AWS’s release of Resource Controls Policies (RCP) when used in combination with existing Service Control Policies (SCP), enables Cloud Architects to create an identity perimeter controlling all undesired permissions and access to ...
Unused AWS services lead to unexpected costs. Here’s how to turn them off

Unused AWS services lead to unexpected costs. Here’s how to turn them off

In a company, who owns the cloud? It’s not always clear. Maybe a better question is: who is responsible for the cloud’s cost? That answer is always the head of Operations. This ...
7 Common AWS Misconfigurations & How to Prevent Them

7 Common AWS Misconfigurations & How to Prevent Them

Reading Time: 6 minutes Amazon Web Services (AWS) stands out as a powerful platform that empowers businesses to scale, innovate, and achieve their goals efficiently. However, cloud computing requires a strong foundation ...
Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise

Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise

Reading Time: 4 minutes One of the most common security management objectives we hear every day in our advisory work at TAG Cyber involves enterprise teams trying to prevent malicious attackers from ...
AWS Shared Responsibility Model

The Shared Responsibility Model in the Cloud

Reading Time: 6 minutes The Shared Responsibility Model in the Cloud Gartner predicts that through 2025, 99% of all cloud security failures will be the customer’s fault. A statistic like this can ...
Sonrai Risk Insights

Sonrai Risk Insights Engine: Instant & Actionable Security

Reading Time: 4 minutes When you turn on a security tool, you want it to be intuitive and impact real operations right away. The last thing your organization needs is a solution ...
Brendan Hannigan - CEO of Sonrai Security (Full Interview)

TL;DR of TAG Cyber and Sonrai Security

Reading Time: 6 minutes As business leaders recognize the increased revenue growth associated with cloud strategies, Information Security teams must find ways to adapt and, more importantly, participate in this rapid deployment ...
Continuously Changing Clouds Need Dynamic Security - Cloud Challenges

Webinar Recap: Continuously Changing Clouds Need Dynamic Security

Reading Time: 5 minutes Recently, one of Sonrai Security’s Principal Solutions Architects, Mindy Schlueter, presented a webinar titled, ‘Continuously Changing Clouds Need Dynamic Security.’ The webinar took a four-prong approach in addressing ...
cloud-native application protection platforms

What’s the Hype Around Cloud-Native Application Protection Platforms?

Reading Time: 5 minutes The cloud security solutions market is growing rapidly and there are many types of solutions to support your specific security needs. Figuring out the right solution, let alone ...