What Analyzing Hundreds of Thousands of Cloud Environments Taught Us About Data Exposure
Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.
Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.
Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.
Build resilient GitHub Actions workflows with lessons from recent attacks.
A hands-on walkthrough of how to use Wiz to find sensitive data and uncover who can access it.
The present and future of security for the Model Context Protocol.
Many of the talks at KubeCon Europe, Europe’s largest open source community conference, were related to security. Let's discuss some of our favorites.
Check out our top podcast episode picks from the past year.
Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.
Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
How to protect sensitive data in cloud-hosted databases with built-in security controls, best practices, and continuous risk monitoring.
A supply chain attack on tj-actions/changed-files caused many repositories to leak their secrets over the weekend. Wiz Research has discovered an additional supply chain attack on reviewdog/actions-setup@v1, that may have contributed to the compromise of tj-actions/changed-files.