CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

Application security engineer job description

Wiz Expertenteam

An application security engineer is a security professional who protects software applications from threats throughout the entire development process.

Wiz in Aktion erleben

Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.

Informationen darüber, wie Wiz mit Ihren personenbezogenen Daten umgeht, finden Sie in unserer Datenschutzerklärung.

Wiz wand

Dark web vs deep web: Understanding the differences

Wiz Expertenteam

While the deep web is mostly used for legitimate, private activities, the dark web hosts both illegal marketplaces and serves as a haven for privacy-seekers and activists in repressive regimes.

Kubernetes incident response: A security playbook

Wiz Expertenteam

Kubernetes security incidents differ fundamentally from traditional IT breaches. Containers and pods are ephemeral—some containers live for only seconds or minutes. They're created, destroyed, and moved within seconds, making it far harder to track attacks compared to static servers.

DevSecOps vs DevOps: Key differences & Comparison

Wiz Expertenteam

DevOps is a way of working that breaks down walls between development and operations teams. This means developers and IT operations work together instead of in separate silos, which helps companies build and release software faster.

What is the threat intelligence lifecycle?

Wiz Expertenteam

The threat intelligence lifecycle is a continuous, six-phase process that transforms raw data about potential cyber threats into refined, actionable intelligence

Threat hunting vs threat intelligence: Key differences

Wiz Expertenteam

Threat hunting actively searches for hidden threats already inside your network, while threat intelligence gathers external information about potential threats to inform security strategy.