3 OAuth TTPs Seen This Month — and How to Detect Them with Entra ID Logs
How OAuth tokens, JWT fields and Entra sign-in logs reveal attacker behavior, and how to turn those signals into reliable detections.
How OAuth tokens, JWT fields and Entra sign-in logs reveal attacker behavior, and how to turn those signals into reliable detections.
Gain visibility into every technology in your environment and eliminate governance gaps.
Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign. Over 25,000 affected repositories across ~350 unique users.
Wiz Defend Certification validates skills in cloud threat detection and response for SOC, IT, and security professionals.
Building a Foundation for Security and Compliance
Inaugural partner program reflects commitment to building an open, unified future for security.
Streamline Security Backlogs by Grouping Vulnerabilities, Secrets, and Data Findings into Posture Issues
Meet the SecOps AI Agent: AI-powered threat triage built on the Wiz platform. Investigate every threat with speed and transparency
How secure are top private AI companies? Find out from our scans and disclosures.
At Wizdom 2025, we’re unveiling two new AI agents alongside new product innovations that deepen and extend the graph across SaaS, workloads, AI infrastructure, and external exposures. Together, these advances enable teams to secure everything they build and run in the cloud and beyond.
Helping teams see clearly, decide wisely, and move safely.
How Wiz AI Agents and Integrations Meet You Where You Work
Providing unconditional visibility into your environment
How Wiz brings visibility, context, and continuous defense to the new era of intelligent automation.
Secure Microsoft 365 and the cloud it powers — one platform, one graph, complete context.
Wiz launches Attack Surface Scanner to bring context, ownership, and prioritization to every exposure, anywhere.
Why Securing Critical Infrastructure Requires a Modern Approach
Build a defensible 2026 security budget with data, not guesswork. We share practical tips, ROI levers, and fresh insights from our survey of 300+ CISOs and security leaders.
Turning compliance chaos into continuous confidence.
Bridge the gap between Platform and Security teams with unified inventory and network visibility across Kubernetes clusters.
See every risk, from the first line of code to what’s running in production. No resource tagging. No CI/CD hacks. Just automatic, reliable traceability both developers and security teams can act on.
Wiz Research has uncovered 550+ secrets hiding in plain sight. We worked with Microsoft to shut the door.
Turning attacker insights into stronger cloud security protections.
Wiz Research discovers vulnerability stemming from 13-year-old bug present in all Redis versions, used in 75% of cloud environments.
How attackers exploit exposed databases for extortion—and the defenses that work.