CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

What is continuous vulnerability scanning?

Wiz Expertenteam

Continuous vulnerability scanning is an automated process that checks systems, networks, and applications for security weaknesses to detect new issues promptly.

Best code analysis tools in 2025

Wiz Expertenteam

This post will explore the top 10 code security platforms to see just how well they secure modern cloud-native applications.

What is a vulnerability scanning report?

Wiz Expertenteam

A vulnerability scanning report is a document from a vulnerability scanner that lists discovered weaknesses, shows how severe they are, and explains how to fix them.

Wiz in Aktion erleben

Wiz verbindet die Punkte in Ihrer Cloud, vom Code bis zur Laufzeit.

Informationen darüber, wie Wiz mit Ihren personenbezogenen Daten umgeht, finden Sie in unserer Datenschutzerklärung.

Wiz wand

What is business email compromise (BEC)?

Wiz Expertenteam

Business email compromise is a targeted cyberattack where criminals impersonate someone you trust—like your CEO, a vendor, or a business partner—to trick you into sending money or revealing confidential information.

What is arbitrary code execution? ACE attacks explained

Wiz Expertenteam

Arbitrary code execution is when an attacker tricks your system into running their malicious code without permission. Think of it like someone breaking into your house and using your computer to do whatever they want.

What are backdoor attacks in cloud environments?

Wiz Expertenteam

A backdoor attack creates a hidden method for bypassing standard authentication or security controls in a computer system, application, or network. Think of it as a secret entrance that allows attackers to return to a compromised system whenever they want, without going through the front door.

What is runtime cloud security?

Wiz Expertenteam

Successful security programs utilize runtime signal analysis with cloud context to eliminate unnecessary alerts and focus on exploitable threats—active malicious behaviors, suspicious identity patterns, and attack paths—not just static vulnerabilities.