CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

Wiz in Aktion erleben

Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.

Informationen darüber, wie Wiz mit Ihren personenbezogenen Daten umgeht, finden Sie in unserer Datenschutzerklärung.

Wiz wand

Generative AI Security: Risks & Best Practices

Wiz Expertenteam

Generative AI (GenAI) security is an area of enterprise cybersecurity that zeroes in on the risks and threats posed by GenAI applications. To reduce your GenAI attack surface, you need a mix of technical controls, policies, teams, and AI security tools.

Top 9 Open-Source SAST Tools

Wiz Expertenteam

In this article, we’ll take a closer look at how you can leverage SAST for code security. We’ll also explore key features of open-source SAST tools, such as language support, integration capabilities, and reporting functionalities.

LLM Security for Enterprises: Risks and Best Practices

Wiz Expertenteam

LLM models, like GPT and other foundation models, come with significant risks if not properly secured. From prompt injection attacks to training data poisoning, the potential vulnerabilities are manifold and far-reaching.

Was ist CSPM?

Cloud Security Posture Management (CSPM) beschreibt den Prozess der kontinuierlichen Erkennung und Behebung von Risiken in Cloud-Umgebungen und -Diensten (z. B. S3-Buckets mit öffentlichem Lesezugriff). CSPM-Tools bewerten Cloud-Konfigurationen automatisch anhand branchenüblicher Best Practices, gesetzlicher Anforderungen und Sicherheitsrichtlinien, um sicherzustellen, dass Cloud-Umgebungen sicher sind und ordnungsgemäß verwaltet werden.

Kubernetes Nodes vs Pods: Key Differences Explained

Wiz Expertenteam

Nodes are the physical or virtual machines that provide computing resources in a Kubernetes cluster, while pods are the smallest deployable units that contain one or more containers

Kubernetes control plane: What it is and how to secure it

Wiz Expertenteam

The Kubernetes control plane is the cluster’s management layer that exposes the API, stores cluster state, and continuously reconciles desired configuration—scheduling, scaling, and replacing pods as needed—to keep applications healthy and consistent across nodes.

What is a memory leak? Detection and prevention guide

Wiz Expertenteam

A memory leak is when a program allocates memory but never releases it back to the system. This means your computer gradually runs out of available memory, like borrowing books from a library but never returning them.

What is API attack surface management?

API attack surface management is focused on discovering, inventorying, analyzing, and continuously monitoring all APIs within an organization’s cloud environment. This enables identification and mitigation of points of exposure that could lead to a breach.

Incident response plan testing for cloud security

Wiz Expertenteam

Incident response plan testing is essential for cloud-native organizations because it goes far beyond checking a box—it’s about proving your team’s ability to handle the unpredictable nature of real attacks.

Was ist SSPM? (SaaS-Verwaltung der Sicherheitslage)

SaaS Security Posture Management (SSPM) ist ein Toolset zum Schutz von SaaS-Anwendungen, indem es Fehlkonfigurationen identifiziert, Berechtigungen verwaltet und die Einhaltung gesetzlicher Vorschriften im gesamten digitalen Bestand Ihres Unternehmens sicherstellt.

Top Incident Response Certifications for Aspiring Responders

Wiz Expertenteam

Incident response certifications are professional credentials that prove you can handle security breaches when they happen. These certifications show employers that you know how to detect threats, contain damage, and get systems back to normal after an attack.