CloudSec Academy
Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.
See Wiz in Action
See how Wiz turns cloud security fundamentals into real-world results.
How to secure the SDLC with Wiz
Learn how to secure the SDLC from code to runtime with DevSecOps best practices: SAST, SCA, IaC scanning, CI/CD hardening, CSPM, CDR, and compliance mapping.
GraphQL API security risks every developer should know about
GraphQL API security is a set of specialized practices and controls for protecting GraphQL endpoints.
Unmanaged API security: What cloud teams need to know
Unmanaged APIs are undocumented interfaces that operate outside standardized security and governance frameworks.
See Wiz in action
Wiz connects the dots across your cloud, from code to runtime.
API security posture management explained
API security posture management, or API-SPM, is a security discipline that focuses on maintaining and proactively improving the security health of enterprise APIs.
The Open-Source CNAPP Toolkit
With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.
Cloud engineer job description (template, skills, salary)
A cloud engineer is a technical expert responsible for architecting, implementing, and managing an organization's cloud infrastructure and services. This role involves working across the full cloud lifecycle, from initial planning and design to deployment and ongoing optimization.
10 Cloud engineer interview questions for hiring managers
This list of questions helps you reveal a candidate's technical capability and their security mindset. Use these prompts to uncover whether candidates can apply context by linking code, identities, infrastructure, and data to prioritize what truly matters.
What is Application Security Posture Management (ASPM)?
Learn the foundation of application security posture management (ASPM) and how you can apply it to improve cloud security posture. Plus, tools you can use.
What is CSPM (Cloud Security Posture Management)?
Learn the foundational elements of cloud security posture management (CSPM). Find out how to improve cloud security and how to unify your cybersecurity.
What is a Honeypot in Cloud Security?
A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.
What is DSPM (Data Security Posture Management)?
Learn data security posture management, how it works, and how you can use it to protect your data, mitigate risks, and enforce compliance for the cloud.
Cloud Application Security: Basics and Best Practices
Cloud app security involves ensuring that both cloud-native and cloud-based apps are protected from vulnerabilities through the use of proper tools and practices.
Unpacking Data Security Policies
A data security policy is a document outlining an organization's guidelines, rules, and standards for managing and protecting sensitive data assets.
How to patch container base images: Methods and best practices
Container base image patching is the process of updating the OS and runtime libraries in the base layer of a container image to remediate vulnerabilities and keep images secure.
The Ultimate Guide to Vulnerability Scanning and Resolution
Master vulnerability scanning with this detailed guide. You’ll learn about scanning types, how scanning works, how to pick the right scanning tool, and more.
Cloud storage costs and secure optimization
Cloud storage cost refers to the total expense associated with storing, accessing, and managing data across cloud platforms like AWS S3, Azure Blob Storage, and Google Cloud Storage.