Skill Level: Technical

Prioritizing AWS Vulnerabilities With Sonrai Identity Insights
Reading Time: 5 minutes Vulnerability management is nothing new to the cybersecurity world, but the paradigms, practices and solutions built for on-prem management are not holding up in the cloud. This calls ...

Optus Faces $1Million Ransom Due to Cloud Misconfiguration
Reading Time: 7 minutes Optus, the Australian telecommunications company, is facing a $1 million ransom from a cybercriminal claiming access to over 11 million records from Optus customers. The customer information includes ...

Effective Permissions: Fact vs. Fiction
Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...

Real Life Examples of AWS and Azure Privilege Escalation
Reading Time: 8 minutes AWS and Azure privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping stone for bad actors to ...

Avoid AWS Lambda Risks
Reading Time: 8 minutes There’s no question that AWS Lambda remains the incumbent leader for serverless computing. Lambda’s recent enhancements, including the ability to allocate up to 10 GB of memory to ...

How To Detect Privilege Escalation: An Attack Simulation
Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...

Avoid AWS Effective Permissions Pitfalls
Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...

12 IAM Cloud Best Practices
Reading Time: 7 minutes Today, Identity and Access Management is at the forefront of security strategies in the cloud, as organizations big and small migrate to this new frontier. However, what is ...

When Would You Use CIEM Solutions?
Reading Time: 7 minutes CIEM has emerged on the market as the best solution to tackle identity and access management in the cloud. Cloud Infrastructure Entitlement Management (CIEM) solutions help organizations gain ...

Real Life Examples of Privilege Escalation in AWS and Azure
Privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping […] The post Real Life Examples of Privilege Escalation in AWS and ...