Modern civilization revolves around inextricably intertwined relationships. This is why our financial markets rise and fall in lock step; why climate change is accelerating; and why a novel virus can so swiftly and pervasively encircle the planet.
Complex relationships also come into play when it comes to operating modern business networks. A lack of understanding of these relationships is a big reason why cloud breaches happen.
The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships. I’m referring to graph databases, which support graph analytics.
With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. Based in New York City, Sonrai launched in late 2017 to help companies gain clarity about data and identity security-related relationships within their public cloud envrionments, including Amazon Web Services, Microsoft Azure, Google Cloud.
We discussed why graph databases and graph analytics are so well-suited to advancing cybersecurity – especially as digital transformation accelerates towards, and within, the cloud. Notably, Sonrai Security’s core platform applies graph analytics to the development and deployment of agile software mapping and operationalizing all identity and data trust relationships, a specific part of the larger security picture. But that’s getting ahead of this story. Here are the key takeaway ..
Support the originator by clicking the read the rest link below.