CloudSec Academy
Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.
Wiz in Aktion erleben
Sehen Sie, wie Wiz Cloud-Sicherheitsgrundlagen in reale Ergebnisse umsetzt.
How to secure the SDLC with Wiz
Learn how to secure the SDLC from code to runtime with DevSecOps best practices: SAST, SCA, IaC scanning, CI/CD hardening, CSPM, CDR, and compliance mapping.
GraphQL API security risks every developer should know about
GraphQL API security is a set of specialized practices and controls for protecting GraphQL endpoints.
Unmanaged API security: What cloud teams need to know
Unmanaged APIs are undocumented interfaces that operate outside standardized security and governance frameworks.
Wiz in Aktion erleben
Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.
API security posture management explained
API security posture management, or API-SPM, is a security discipline that focuses on maintaining and proactively improving the security health of enterprise APIs.
The Open-Source CNAPP Toolkit
With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.
Cloud engineer job description (template, skills, salary)
A cloud engineer is a technical expert responsible for architecting, implementing, and managing an organization's cloud infrastructure and services. This role involves working across the full cloud lifecycle, from initial planning and design to deployment and ongoing optimization.
10 Cloud engineer interview questions for hiring managers
This list of questions helps you reveal a candidate's technical capability and their security mindset. Use these prompts to uncover whether candidates can apply context by linking code, identities, infrastructure, and data to prioritize what truly matters.
Was ist ASPM? [Application Security Posture Management]
Application Security Posture Management umfasst die kontinuierliche Bewertung von Anwendungen auf Bedrohungen, Risiken und Schwachstellen während des gesamten Software Development Lifecycle (SDLC).
Was ist CSPM?
Cloud Security Posture Management (CSPM) beschreibt den Prozess der kontinuierlichen Erkennung und Behebung von Risiken in Cloud-Umgebungen und -Diensten (z. B. S3-Buckets mit öffentlichem Lesezugriff). CSPM-Tools bewerten Cloud-Konfigurationen automatisch anhand branchenüblicher Best Practices, gesetzlicher Anforderungen und Sicherheitsrichtlinien, um sicherzustellen, dass Cloud-Umgebungen sicher sind und ordnungsgemäß verwaltet werden.
What is a Honeypot in Cloud Security?
A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.
Was ist DSPM? [Data Security Posture Management]
Data Security Posture Management (DSPM) ist eine Lösung zur kontinuierlichen Überwachung der Datensicherheitsrichtlinien und -verfahren eines Unternehmens, um Schwachstellen und potenzielle Risiken zu erkennen.
Cloud Application Security: Basics and Best Practices
Cloud app security involves ensuring that both cloud-native and cloud-based apps are protected from vulnerabilities through the use of proper tools and practices.
Unpacking Data Security Policies
A data security policy is a document outlining an organization's guidelines, rules, and standards for managing and protecting sensitive data assets.
How to patch container base images: Methods and best practices
Container base image patching is the process of updating the OS and runtime libraries in the base layer of a container image to remediate vulnerabilities and keep images secure.
Schwachstellen-Scans (Vulnerability Scanning)
Beim Schwachstellen-Scanning werden Sicherheitslücken in IT-Systemen, Netzwerken und Software erkannt und bewertet.
Cloud storage costs and secure optimization
Cloud storage cost refers to the total expense associated with storing, accessing, and managing data across cloud platforms like AWS S3, Azure Blob Storage, and Google Cloud Storage.