CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

What is zero trust data security?

Wiz Experts Team

Zero trust data security extends traditional zero trust principles to data protection by requiring continuous verification.

What are GDPR security controls?

Wiz Experts Team

GDPR security controls are the mandatory technical and organizational safeguards you must implement to protect the personal data you process.

See Wiz in action

Wiz connects the dots across your cloud, from code to runtime.

For information about how Wiz handles your personal data, please see our Privacy Policy.

Wiz wand

CI/CD security tools

Wiz Experts Team

CI/CD security tools automate security checks in development pipelines to identify vulnerabilities and misconfigurations during code changes, ensuring continuous security.

Top 9 OSINT tools

Wiz Experts Team

Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.

SecOps Explained

Wiz Experts Team

SecOps is the collaborative integration of IT security and operations teams to protect and manage an organization's digital assets more efficiently.

Using eBPF in Kubernetes: A security overview

Wiz Experts Team

eBPF provides deep visibility into network traffic and application performance while maintaining safety and efficiency by executing custom code in response to the kernel at runtime.

AI-BOM: Building an AI Bill of Materials

An AI bill of materials (AI-BOM) is a complete inventory of all the assets in your organization’s AI ecosystem. It documents datasets, models, software, hardware, and dependencies across the entire lifecycle of AI systems—from initial development to deployment and monitoring.

How to Make Your Incident Response Framework Actionable

Wiz Experts Team

An incident response framework is a blueprint that helps organizations deal with security incidents in a structured and efficient way. It outlines the steps to take before, during, and after an incident, and assigns roles and responsibilities to different team members.

Serverless Security Explained

Wiz Experts Team

Serverless security is the extra layer of protection designed for applications built on a serverless architecture. In this type of cloud computing, you write the code (functions) but the cloud provider handles the servers. This creates a different security approach.

GitOps vs. DevOps: How GitOps Keeps You Aligned

While DevOps delineates collaboration and automation practices that emphasize infrastructure provisioning and continuous monitoring, GitOps extends its concepts by employing Git as the single source of truth for both application and infrastructure settings.