Skill Level: Executive
5 Reasons You Wouldn’t Buy Sonrai
Reading Time: 7 minutes If you’re reading this, you might be considering a cloud security solution – maybe an identity and permissions-focused one – maybe even Sonrai. Potential customers are our best ...
Know the Unknown: Diagnosing Identity Risks in Your Cloud
Reading Time: 6 minutes When it comes to insufficient cloud security measures, organizations are unaware of the danger they face. Perhaps their organization migrated to the cloud and brought along the same ...
Why Approaching Cloud Security Outside-In Is Insufficient for Enterprise
Reading Time: 4 minutes One of the most common security management objectives we hear every day in our advisory work at TAG Cyber involves enterprise teams trying to prevent malicious attackers from ...
4 Tips If You’re Struggling To Find (Good) Cloud Talent
Reading Time: 6 minutes “Cloud keeps growing, and it is capturing an ever-larger share of information technology spending,” remarked Lee Sustar from Forrester Inc. “Big banks and other companies aren’t simply migrating ...
Sonrai Risk Insights Engine: Instant & Actionable Security
Reading Time: 4 minutes When you turn on a security tool, you want it to be intuitive and impact real operations right away. The last thing your organization needs is a solution ...
ICYMI: Significant Changes to NYDFS Cybersecurity Regulations
Reading Time: 7 minutes In March 2017, the first iteration of The New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500) came into effect.These requirements ...
Highlights: IBM Security’s Cloud Threat Landscape Report 2022
Reading Time: 6 minutes New IBM X-Force team research supports what we already know to be true: organizations are falling behind on basic security practices in the cloud, exposing them to even ...
Attack Path Analysis: Breaking Down Paths To Your Data
Reading Time: 5 minutes If you’re not focused on identity and access controls, then you are running blind to today’s threat landscape. Today, identity is what creates a pathway to your sensitive ...
TL;DR of TAG Cyber and Sonrai Security
Reading Time: 6 minutes As business leaders recognize the increased revenue growth associated with cloud strategies, Information Security teams must find ways to adapt and, more importantly, participate in this rapid deployment ...
Webinar Recap: Continuously Changing Clouds Need Dynamic Security
Reading Time: 5 minutes Recently, one of Sonrai Security’s Principal Solutions Architects, Mindy Schlueter, presented a webinar titled, ‘Continuously Changing Clouds Need Dynamic Security.’ The webinar took a four-prong approach in addressing ...