top of page
Home & Business Security Tips | Sonoran Security Blog
All Reports
Read our latest reports on regional cyber threats. We track digital risks and explain them in plain language so you can stay safe and informed.


Transforming Identity Governance with AI: Use Cases in Anomaly Detection and Automated Provisioning
Identity Governance and Administration (IGA) plays a critical role in managing digital identities and controlling access to resources within organizations. As cyber threats grow more sophisticated and regulatory demands increase, traditional IGA methods struggle to keep pace. Artificial Intelligence (AI) is now reshaping how organizations handle identity governance by introducing smarter, faster, and more accurate processes. This post explores how AI is changing IGA, focusing
Jonathan Lanyon
Mar 153 min read


Securing Southern California's Critical Infrastructure: The Intersection of Utilities and ICS Cybersecurity
Critical infrastructure in Southern California faces unique challenges. The region’s arid climate and sprawling urban areas depend heavily on reliable water and power systems. These utilities form the backbone of daily life, supporting millions of residents and businesses. Protecting these systems from cyber threats is essential to avoid disruptions that could have severe consequences. Industrial Control Systems (ICS) play a central role in managing utilities like water treat
Jonathan Lanyon
Mar 144 min read


PAM Failures Exposed: Lessons Learned from Real-World Cyber Breaches
Critical server room showing network hardware involved in cyber breaches Privileged Access Management (PAM) is a cornerstone of modern cybersecurity strategies. Yet, despite its importance, many organizations still struggle to implement it effectively. The consequences of these failures are clear: real-world cyber breaches that expose sensitive data, disrupt operations, and damage reputations. This post explores why shared accounts and weak PAM practices have become a liabili
Jonathan Lanyon
2 days ago3 min read


Understanding Zero Trust: A Comprehensive IAM Strategy for Identity Teams
Zero Trust has become a popular term in cybersecurity, often presented as a product or a quick fix. The reality is different. Zero Trust is not a single tool or software; it is a strategic approach to identity and access management (IAM) that reshapes how organizations secure their digital environments. For identity teams, understanding Zero Trust means moving beyond vendor hype and focusing on practical, effective ways to protect users, devices, and data. Digital lock icon s
Jonathan Lanyon
6 days ago4 min read


Navigating Cloud Identity: A Trend Analysis of Okta, Entra ID, and Ping
Cloud identity management has become a critical pillar for organizations adapting to digital transformation. As companies move more workloads and users to the cloud, managing who accesses what, when, and how grows increasingly complex. Okta, Entra ID (formerly Azure Active Directory), and Ping Identity stand out as leading platforms shaping this space. Understanding where these solutions are headed helps IT leaders and security professionals prepare for the evolving identity
Jonathan Lanyon
Mar 244 min read


Fortifying the Strip How Las Vegas Casinos Tackle Cybersecurity Challenges
Las Vegas casinos face a unique and constant threat: cyberattacks targeting their vast digital infrastructure. These attacks can disrupt operations, steal sensitive customer data, or manipulate gaming systems. Protecting millions of dollars in assets and maintaining trust requires a strong, multi-layered defense. This post explores how casinos on the Las Vegas Strip defend against cyber threats, the challenges they face, and the strategies they use to stay secure. The Growing
Jonathan Lanyon
Mar 183 min read


Navigating Passkeys in 2026: Overcoming Adoption Barriers for IAM Leaders
Passwordless authentication has long promised a future where users no longer struggle with weak or reused passwords. In 2026, passkeys stand as a leading contender to replace traditional passwords, offering a more secure and user-friendly way to access digital services. Yet, despite the clear benefits, widespread enterprise adoption remains uneven. This post explores where passkeys stand today, the barriers slowing their adoption in organizations, and practical steps identity
Jonathan Lanyon
Mar 163 min read


Understanding Identity-Based Attacks: Credential Stuffing, MFA Fatigue, and More
Identity-based attacks have become a major threat to digital security. As organizations and individuals rely more on online accounts and digital identities, attackers focus on exploiting these identities to gain unauthorized access. This shift makes identity and access management (IAM) a critical defense line. This post explores key identity-based attack methods such as credential stuffing, MFA fatigue, session hijacking, and OAuth abuse, explaining how they work and what can
Jonathan Lanyon
Mar 24 min read


Top Skills Employers Seek in Cybersecurity Professionals in Arizona
Cybersecurity remains one of the fastest-growing fields in the tech industry, with Arizona emerging as a key hub for companies seeking skilled professionals. As cyber threats evolve, employers in Arizona are looking for candidates who bring not only technical expertise but also practical skills that align with real-world challenges. This post explores the top skills that cybersecurity employers in Arizona prioritize, supported by data and examples to help job seekers focus th
Jonathan Lanyon
Feb 274 min read


Weekly Arizona Cybersecurity Headlines
Cybersecurity remains a critical concern for Arizona as local governments, educational institutions, and election systems face ongoing threats. Recent events highlight both the risks and the resilience of the state’s digital infrastructure. This update covers key developments including a major recovery of public funds after a cyberattack in Yavapai County, ongoing phishing threats at the University of Arizona, and the lasting impact of a previous election system breach. Under
Jonathan Lanyon
Feb 253 min read
Transforming Identity Governance with AI: Use Cases in Anomaly Detection and Automated Provisioning
Identity Governance and Administration (IGA) plays a critical role in managing digital identities and controlling access to resources within organizations. As cyber threats grow more sophisticated and regulatory demands increase, traditional IGA methods struggle to keep pace. Artificial Intelligence (AI) is now reshaping how organizations handle identity governance by introducing smarter, faster, and more accurate processes. This post explores how AI is changing IGA, focusing
Mar 153 min read
Securing Southern California's Critical Infrastructure: The Intersection of Utilities and ICS Cybersecurity
Critical infrastructure in Southern California faces unique challenges. The region’s arid climate and sprawling urban areas depend heavily on reliable water and power systems. These utilities form the backbone of daily life, supporting millions of residents and businesses. Protecting these systems from cyber threats is essential to avoid disruptions that could have severe consequences. Industrial Control Systems (ICS) play a central role in managing utilities like water treat
Mar 144 min read
PAM Failures Exposed: Lessons Learned from Real-World Cyber Breaches
Critical server room showing network hardware involved in cyber breaches Privileged Access Management (PAM) is a cornerstone of modern cybersecurity strategies. Yet, despite its importance, many organizations still struggle to implement it effectively. The consequences of these failures are clear: real-world cyber breaches that expose sensitive data, disrupt operations, and damage reputations. This post explores why shared accounts and weak PAM practices have become a liabili
2 days ago3 min read
bottom of page