CloudSec

Get grounded in the core concepts of cloud security. These articles cover foundational models, shared responsibility, architectural risks, and cross-cloud practices that help secure any environment.

The Open-Source CNAPP Toolkit

Wiz Expertenteam

With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.

What is SIEM? The cloud-native security evolution

Wiz Expertenteam

SIEM stands for Security Information and Event Management. It is a unified platform that combines Security Information Management (SIM) and Security Event Management (SEM).

9 Best Practices for Stronger Azure Security

Wiz Expertenteam

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Wiz Expertenteam

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

CSPM in AWS

Wiz Expertenteam

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

What is AWS vulnerability scanning?

Wiz Expertenteam

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.

How to Evaluate Wiz: Common FAQs

Wiz Expertenteam

This FAQ is designed to help teams evaluate whether Wiz is the right cloud security solution for them by answering the most common technical, strategic, and logistical questions.

Attack surface discovery: From blind spots to visibility

Wiz Expertenteam

Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).

Attack surfaces vs. attack vectors: What security teams need to know

Wiz Expertenteam

This blog post will explain strategies for attack surface management (ASM) that integrate both attack surface reduction and attack vector defense into one continuous process, helping you meet the requirements of leading security frameworks like Gartner’s Continuous Threat Exposure Management (CTEM) framework.

What is runtime cloud security?

Wiz Expertenteam

Successful security programs utilize runtime signal analysis with cloud context to eliminate unnecessary alerts and focus on exploitable threats—active malicious behaviors, suspicious identity patterns, and attack paths—not just static vulnerabilities.

Serverless Security Explained

Wiz Expertenteam

Serverless security is the extra layer of protection designed for applications built on a serverless architecture. In this type of cloud computing, you write the code (functions) but the cloud provider handles the servers. This creates a different security approach.

What is CTEM (Continuous Threat Exposure Management)?

Continuous Threat Exposure Management (CTEM) has emerged as a proactive approach to cybersecurity, enabling security teams to identify, assess, and mitigate threats—in real-time, which is key. However, despite its growing popularity, there are still many questions surrounding CTEM. In this blog post, we'll delve into the top seven questions that cybersecurity practitioners often ask about CTEM—see if you’ve been looking for answers to these yourself!

What is cloud security testing?

Cloud security testing is the process of evaluating your entire cloud infrastructure for security risks and misconfigurations—proactively, systematically, and continuously.

CSPM in Azure

Wiz Expertenteam

All major cloud providers have adopted a CSPM solution to help organizations handle their part of the shared responsibility model. In Azure, CSPM is a critical component in making sure your infrastructure is secure, compliant, and resilient to cybersecurity threats.

The top 7 Cloud Security Solutions

Wiz Expertenteam

The difference between market leaders and niche solutions? Comprehensive coverage without operational compromises. This post provides a practical blueprint for judging those claims and selecting technology that truly fits your organization.

What is Cyber Asset Attack Surface Management (CAASM)?

Cyber asset attack surface management (CAASM) is a security practice that gives teams unified visibility and control over all enterprise assets—cloud, SaaS, on-prem, and beyond. It helps eliminate blind spots and reduce risk by correlating asset data from across your environment and tools. CAASM enables teams to query, prioritize, and act from a single source of truth.

What is Attack Surface Analysis?

Wiz Expertenteam

Attack surface analysis is a cybersecurity practice that identifies and evaluates all potential access points, external and internal, that an attacker could exploit.

On-Premise vs. Cloud Security

Wiz Expertenteam

Let's compare on-premises and cloud security, examine their differences, and explore key cloud-specific security concepts to help you choose the best approaches to security for your entire organization.

CIEM Solutions: Options to Consider

Wiz Expertenteam

Smart CIEM beats basic visibility. The best platforms prioritize real attack paths and provide actionable fixes, not just permission inventories.

ABAC vs. RBAC: What’s the difference?

Wiz Expertenteam

Choosing between role-based access control (RBAC) and attribute-based access control (ABAC) sets up how your cloud stack determines who may do what, where, and when. This blog post shows you the functional differences between the two models.

What is a VPC?

Wiz Expertenteam

A VPC is a logically isolated private network within a public cloud that users can fully configure.

How to Choose a CNAPP: A Security Leader’s Cheat Sheet

Wiz Expertenteam

In this guide, we’ll show you how to choose a CNAPP that cuts through complexity and gives your team a real path to security: with full-stack visibility, runtime protection, and developer-friendly workflows.

How to Evaluate CSP security: A Checklist

Wiz Expertenteam

Cloud service providers offer on-demand, scalable computing resources like storage services, applications, and cloud-based compute. Using a structured checklist can help your business select a cloud provider that has the features you need to meet your security goals.

What is Unauthorized Access?

Wiz Expertenteam

Unauthorized access refers to any successful or attempted access to systems, services, or data without the proper permissions. These incidents can result from misconfigurations, credential theft, or flaws in identity and access management—and often go unnoticed without proper detection mechanisms in place.

What is a Cloud Security Audit?

Wiz Expertenteam

Aimed at verifying security, compliance, and operational resilience, a cloud security audit is a structured evaluation of an organization's cloud environments, infrastructure, configurations, access controls, and security policies.

CSPM vs. CWPP: Should You Use One or Both?

Wiz Expertenteam

Explore CWPP vs. CSPM to learn more about their roles and differences and why a unified CNAPP may offer the best cloud security strategy for your organization.

Cloud Service Providers: Choosing the Right Platform

Wiz Expertenteam

Cloud service providers (CSPs) are companies that offer on-demand computing resources—including servers, storage, databases, and networking—hosted in the cloud and accessible through the web.

CNAPP vs. ASPM: What’s the Difference?

Wiz Expertenteam

This article breaks down the relationship between CNAPPs and ASPM, clarifies how they overlap, and explains why organizations benefit most from a platform that brings both together.

Managed Cloud Security

Wiz Expertenteam

Managed cloud security helps organizations scale protection across cloud environments by outsourcing key operations like detection, response, and compliance monitoring.

The Modern Cloud Security Maturity Model

Wiz Expertenteam

A maturity model isn’t just a framework—it’s your roadmap to evolving beyond compliance checklists. Start with foundational controls (like asset inventory and basic IAM hygiene) and progress to advanced practices like threat modeling and runtime protection.

The Top 5 CNAPP benefits you need to know in 2026

Wiz Expertenteam

A CNAPP, or Cloud Native Application Protection Platform, is an integrated security solution that unifies multiple cloud security capabilities—like CSPM, CWPP, CIEM, and IaC scanning—into a single platform.

Exposure Management vs. Vulnerability Management: What’s the difference?

Wiz Expertenteam

Both approaches are unique, but they function as complementary cybersecurity frameworks for managing threats and vulnerabilities in modern IT systems. Together, EM and VM are essential for minimizing your attack surface, ensuring regulatory compliance, and preventing breaches.

Top Azure Security Tools By Category

Wiz Expertenteam

Explore the top Azure security tools by category, from compliance and threat detection to network protection, so you can achieve strong cloud security.

Private vs. Public Cloud: What’s the Difference?

Wiz Expertenteam

In this blog post, we’ll explore the differences between public and private cloud models and provide use cases and best practices to help you choose the best cloud strategy for your business.

What is SaaS Security?

Wiz Expertenteam

Software as a service (SaaS) refers to cloud-based software applications that can be accessed over the internet without any installation or maintenance on local devices.

CNAPP vs. CASB: What’s the difference?

Wiz Expertenteam

Both CNAPP and CASB protect enterprise IT environments, but businesses have to understand their differences, specifically in terms of focus, capabilities, and operationalization, to make an informed decision about which solution is better for them.

CNAPP vs. CDR: What's the Difference?

Wiz Expertenteam

While CDR and CNAPP are often discussed as separate approaches, CDR capabilities should be viewed as essential components within a comprehensive CNAPP strategy, not as competing alternatives.

Top 9 AWS Security Tools

Wiz Expertenteam

11 native tools for IAM, data protection, network and application protection, compliance management, and threat detection

What is Cloud Configuration Management?

Wiz Expertenteam

Cloud configuration management is the process of defining, enforcing, and maintaining consistent cloud resource configurations across environments. This includes automating deployment, monitoring compliance, preventing misconfigurations, and ensuring security, cost efficiency, and operational reliability.

Dissecting Cloud Attacks and Attack Vectors

Wiz Expertenteam

Cloud attacks are malicious activities that target cloud data and infrastructure. By exploiting cloud vulnerabilities, attackers try to access and tamper with cloud data by exfiltrating sensitive information or disrupting operations.

What Is Shadow IT? Causes, Risks, and Examples

Wiz Expertenteam

Shadow IT is an employee’s unauthorized use of IT services, applications, and resources that aren’t controlled by—or visible to—an organization’s IT department.

Identity Security [Cloud Edition]

Wiz Expertenteam

Cloud identity security is the practice of safeguarding digital identities and the sensitive cloud infrastructure and data they gatekeep from unauthorized access and misuse.

Effective Permissions: A Security Review

Wiz Expertenteam

In this article, we will explore the challenges of managing permissions, the risks associated with improper access controls, and how major cloud providers handle permissions. We’ll also take a look at best practices and advanced solutions like cloud infrastructure entitlement management (CIEM).

What is Cloud Risk Management?

Wiz Expertenteam

In this article, we’ll explore what cloud risk management entails and take an in-depth look at the tools that can keep your systems safe.

What is Cloud Visibility? + Best Practices

Wiz Expertenteam

As cloud adoption grows, the only way to mitigate risks and access the full spectrum of cloud capabilities is to prioritize visibility. Read on to learn more about cloud visibility—and how to achieve it.

Cloud Sprawl Explained

Wiz Expertenteam

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

CSPM vs DSPM: Why You Need Both

Wiz Expertenteam

Discover the similarities between CSPM and DSPM, what factors set them apart, and which one is the best choice for your organization’s needs.

Cloud Migration Security Explained

Cloud migration security is a facet of cybersecurity that protects organizations from security risks during a transition to cloud environments from legacy infrastructure, like on-premises data centers.

CSPM vs. SSPM

Wiz Expertenteam

This post discusses CSPM and SSPM in depth to reveal their respective use cases. You'll also learn how CSPM and SSPM complement each other to strengthen your overall security posture.

AWS Security Risks

Wiz Expertenteam

This article examines common AWS security challenges, including identity and access control gaps, data exposure risks, and monitoring blind spots.

CIEM vs. IAM

Wiz Expertenteam

In this article, we'll compare CIEM and IAM to explain how these crucial techniques help reduce your attack surface.

Understanding the Shared Responsibility Model

Wiz Expertenteam

The shared responsibility model is a framework establishing cloud security responsibilities between cloud service providers (AWS, GCP, Azure) and customers.

Cloud Security Strategy

Wiz Expertenteam

A cloud security strategy is the combination of the measures, tools, policies, and procedures used to secure cloud data, applications, and infrastructure.

CIEM vs CSPM: Why You Need Both

Wiz Expertenteam

CSPM focuses on securing cloud infrastructure by identifying and remediating misconfigurations, while CIEM centers on managing and securing user identities and access permissions within cloud environments, addressing threats related to unauthorized access and entitlements.

CNAPP vs CSPM

Wiz Expertenteam

Learn where CNAPP and CSPM overlap, where they differ, and which one is right for your organization.