Sonrai Expert Series: Excessive vs Effective Permissions

5 Reasons You Wouldn’t Buy Sonrai

Reading Time: 7 minutes If you’re reading this, you might be considering a cloud security solution – maybe an identity and permissions-focused one – maybe even Sonrai. Potential customers are our best ...
CID risk score card

Know the Unknown: Diagnosing Identity Risks in Your Cloud

Reading Time: 6 minutes When it comes to insufficient cloud security measures, organizations are unaware of the danger they face. Perhaps their organization migrated to the cloud and brought along the same ...
Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise

Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise

Reading Time: 4 minutes One of the most common security management objectives we hear every day in our advisory work at TAG Cyber involves enterprise teams trying to prevent malicious attackers from ...
4 Tips If You’re Struggling To Find (Good) Cloud Talent

4 Tips If You’re Struggling To Find (Good) Cloud Talent

Reading Time: 6 minutes “Cloud keeps growing, and it is capturing an ever-larger share of information technology spending,” remarked Lee Sustar from Forrester Inc. “Big banks and other companies aren’t simply migrating ...
Sonrai Risk Insights

Sonrai Risk Insights Engine: Instant & Actionable Security

Reading Time: 4 minutes When you turn on a security tool, you want it to be intuitive and impact real operations right away. The last thing your organization needs is a solution ...
NYDFS cybersecurity

ICYMI: Significant Changes to NYDFS Cybersecurity Regulations

Reading Time: 7 minutes In March 2017, the first iteration of The New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500) came into effect.These requirements ...
Highlights: IBM Security’s Cloud Threat Landscape Report 2022

Highlights: IBM Security’s Cloud Threat Landscape Report 2022

Reading Time: 6 minutes New IBM X-Force team research supports what we already know to be true: organizations are falling behind on basic security practices in the cloud, exposing them to even ...
sonrai workflow and automation bots icon

Attack Path Analysis: Breaking Down Paths To Your Data

Reading Time: 5 minutes If you’re not focused on identity and access controls, then you are running blind to today’s threat landscape. Today, identity is what creates a pathway to your sensitive ...
Brendan Hannigan - CEO of Sonrai Security (Full Interview)

TL;DR of TAG Cyber and Sonrai Security

Reading Time: 6 minutes As business leaders recognize the increased revenue growth associated with cloud strategies, Information Security teams must find ways to adapt and, more importantly, participate in this rapid deployment ...
Continuously Changing Clouds Need Dynamic Security - Cloud Challenges

Webinar Recap: Continuously Changing Clouds Need Dynamic Security

Reading Time: 5 minutes Recently, one of Sonrai Security’s Principal Solutions Architects, Mindy Schlueter, presented a webinar titled, ‘Continuously Changing Clouds Need Dynamic Security.’ The webinar took a four-prong approach in addressing ...