Making Sense of Kubernetes Initial Access Vectors Part 2 - Data Plane
Learn about Kubernetes data plane access, including applications running on the cluster, container images, and execution-as-a-service workload types.
Learn about Kubernetes data plane access, including applications running on the cluster, container images, and execution-as-a-service workload types.
Wiz increases investments in products and presence for European customers by enabling support for AWS European Sovereign Cloud (ESC) and new regional headquarters.
Explore Kubernetes control plane access vectors, risks, and security strategies to prevent unauthorized access and protect your clusters from potential threats.
Wiz Research looks at phishing tactics, along with how to trace and investigate these campaigns.
Learn how Wiz helps you govern who can access what data in your cloud and protect your critical data
The new AI-powered remediation 2.0 combines the power of GenAI with the Wiz Research Team’s expertise in identifying cloud-native attack paths.
Don’t get spooked: Navigate the risks of generative AI with proven strategies to protect your organization 👻
Supply chain attack in popular lottie-player library compromises websites with malicious Web3 wallet prompts – update or revert the library to avoid the compromised versions.
Prioritizing vulnerabilities in the cloud can be overwhelming - Learn how teams adopt a workflow structured for speed and accuracy.
Wiz extends its cloud-native runtime sensor to secure serverless containers, providing deep visibility, blocking, and hunting capabilities for AWS Fargate and Azure Container Apps.
Wiz extends support to Okta with identity modeling on the Wiz Security Graph, visibility, risk assessment, and real-time threat detection for your Okta environment
AskAI – Text to Security Graph Query
We are excited to announce the addition of the Wiz Sensor to Wiz for Gov’s ATO. The lightweight eBPF based sensor improves risk prioritization, deepens threat detection, and adds runtime protection for container hosts and VMs.
Detect and mitigate critical vulnerabilities (CVE-2024-9463, CVE-2024-9464, CVE-2024-9465, CVE-2024-9466, CVE-2024-9467) in Palo Alto Networks’ Expedition tool. Organizations should patch urgently.
In the cloud, logs are often the only way to get real-time visibility into what's happening, making them critical to any cloud detection and response program.
An update on our commitments to customer security.
Detect and mitigate CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177 vulnerabilities impacting CUPS and IPP packages.
Critical severity vulnerability CVE-2024-0132 affecting NVIDIA Container Toolkit and GPU Operator presents high risk to AI workloads and environments.
Enhance your security with Wiz’s new hybrid File Integrity Monitoring (FIM) solution, combining agentless and runtime capabilities for comprehensive file monitoring.
Gain unified visibility into Snowflake security posture and threats with the same workflows as the rest of your cloud.
Strategies for tracking and defending against malicious activity and threats in the cloud using atomic indicators of compromise (IOCs).
Wiz collaborates with Microsoft on the quest to make the cloud more secure for everyone.
Enhance your application security posture with Wiz Code's integration of 3rd-party SAST scanners and cloud context for faster risk prioritization and remediation.