CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

How to secure the SDLC with Wiz

Wiz Experts Team

Learn how to secure the SDLC from code to runtime with DevSecOps best practices: SAST, SCA, IaC scanning, CI/CD hardening, CSPM, CDR, and compliance mapping.

API security posture management explained

Wiz Experts Team

API security posture management, or API-SPM, is a security discipline that focuses on maintaining and proactively improving the security health of enterprise APIs.

See Wiz in action

Wiz connects the dots across your cloud, from code to runtime.

For information about how Wiz handles your personal data, please see our Privacy Policy.

Wiz wand

The Open-Source CNAPP Toolkit

Wiz Experts Team

With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.

Cloud engineer job description (template, skills, salary)

Wiz Experts Team

A cloud engineer is a technical expert responsible for architecting, implementing, and managing an organization's cloud infrastructure and services. This role involves working across the full cloud lifecycle, from initial planning and design to deployment and ongoing optimization.

10 Cloud engineer interview questions for hiring managers

Wiz Experts Team

This list of questions helps you reveal a candidate's technical capability and their security mindset. Use these prompts to uncover whether candidates can apply context by linking code, identities, infrastructure, and data to prioritize what truly matters. 

What is a Honeypot in Cloud Security?

Wiz Experts Team

A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.