aws ec2 inspector

Prioritizing AWS Vulnerabilities With Sonrai Identity Insights

Reading Time: 5 minutes Vulnerability management is nothing new to the cybersecurity world, but the paradigms, practices and solutions built for on-prem management are not holding up in the cloud. This calls ...
Optus Faces $1Million Ransom Due to Cloud Misconfiguration

Optus Faces $1Million Ransom Due to Cloud Misconfiguration

Reading Time: 7 minutes Optus, the Australian telecommunications company, is facing a $1 million ransom from a cybercriminal claiming access to over 11 million records from Optus customers. The customer information includes ...
Key differences between manual, periodic audits and continuous audit and why Sonrai Dig enables organizations to achieve continuous monitoring for audit.

Effective Permissions: Fact vs. Fiction

Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...
By 2025 Gartner states that 90% of the orgs that fail to control public cloud ise will inappropriately share sensitive data. AWS and Azure privilege escalation blog information.

Real Life Examples of AWS and Azure Privilege Escalation

Reading Time: 8 minutes AWS and Azure privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping stone for bad actors to ...
AWS Shared Responsibility Model

Avoid AWS Lambda Risks

Reading Time: 8 minutes There’s no question that AWS Lambda remains the incumbent leader for serverless computing. Lambda’s recent enhancements, including the ability to allocate up to 10 GB of memory to ...
privilege escalation

How To Detect Privilege Escalation: An Attack Simulation

Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...
aws effective permissions

Avoid AWS Effective Permissions Pitfalls

Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...
cloud iam

12 IAM Cloud Best Practices

Reading Time: 7 minutes Today, Identity and Access Management is at the forefront of security strategies in the cloud, as organizations big and small migrate to this new frontier. However, what is ...
ciem solutions

When Would You Use CIEM Solutions?

Reading Time: 7 minutes CIEM has emerged on the market as the best solution to tackle identity and access management in the cloud. Cloud Infrastructure Entitlement Management (CIEM) solutions help  organizations gain ...
reallife examples of privilege escalation

Real Life Examples of Privilege Escalation in AWS and Azure

Privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping […] The post Real Life Examples of Privilege Escalation in AWS and ...