CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

9 Best Practices for Stronger Azure Security

Wiz Expertenteam

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Wiz Expertenteam

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

What are Application Security Frameworks?

Wiz Expertenteam

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

Wiz in Aktion erleben

Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.

Informationen darüber, wie Wiz mit Ihren personenbezogenen Daten umgeht, finden Sie in unserer Datenschutzerklärung.

Wiz wand

What is zero trust architecture? A complete guide for cloud security

Wiz Expertenteam

Enterprises have started gradually shifting from perimeter-based defenses to more proactive and identity-centric protection. Zero trust architecture eliminates implicit trust assumptions by requiring continuous verification of every user, device, and transaction.

What is SBOM scanning?

Wiz Expertenteam

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Wiz Expertenteam

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

CSPM in AWS

Wiz Expertenteam

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

SAST vs. SCA: What's the Difference?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

What is AWS vulnerability scanning?

Wiz Expertenteam

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.