CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

DevSecOps vs DevOps: Key differences & Comparison

Wiz Expertenteam

DevOps is a way of working that breaks down walls between development and operations teams. This means developers and IT operations work together instead of in separate silos, which helps companies build and release software faster.

Wiz in Aktion erleben

Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.

Informationen darüber, wie Wiz mit Ihren personenbezogenen Daten umgeht, finden Sie in unserer Datenschutzerklärung.

Wiz wand

What is the threat intelligence lifecycle?

Wiz Expertenteam

The threat intelligence lifecycle is a continuous, six-phase process that transforms raw data about potential cyber threats into refined, actionable intelligence

Threat hunting vs threat intelligence: Key differences

Wiz Expertenteam

Threat hunting actively searches for hidden threats already inside your network, while threat intelligence gathers external information about potential threats to inform security strategy.

Generative AI Security: Risks & Best Practices

Wiz Expertenteam

Generative AI (GenAI) security is an area of enterprise cybersecurity that zeroes in on the risks and threats posed by GenAI applications. To reduce your GenAI attack surface, you need a mix of technical controls, policies, teams, and AI security tools.

Top 9 Open-Source SAST Tools

Wiz Expertenteam

In this article, we’ll take a closer look at how you can leverage SAST for code security. We’ll also explore key features of open-source SAST tools, such as language support, integration capabilities, and reporting functionalities.

LLM Security for Enterprises: Risks and Best Practices

Wiz Expertenteam

LLM models, like GPT and other foundation models, come with significant risks if not properly secured. From prompt injection attacks to training data poisoning, the potential vulnerabilities are manifold and far-reaching.

Was ist CSPM?

Cloud Security Posture Management (CSPM) beschreibt den Prozess der kontinuierlichen Erkennung und Behebung von Risiken in Cloud-Umgebungen und -Diensten (z. B. S3-Buckets mit öffentlichem Lesezugriff). CSPM-Tools bewerten Cloud-Konfigurationen automatisch anhand branchenüblicher Best Practices, gesetzlicher Anforderungen und Sicherheitsrichtlinien, um sicherzustellen, dass Cloud-Umgebungen sicher sind und ordnungsgemäß verwaltet werden.

Kubernetes Nodes vs Pods: Key Differences Explained

Wiz Expertenteam

Nodes are the physical or virtual machines that provide computing resources in a Kubernetes cluster, while pods are the smallest deployable units that contain one or more containers