CloudSec Academy

Bienvenido a CloudSec Academy, tu guía para navegar por la sopa de alfabeto de los acrónimos de seguridad en la nube y la jerga de la industria. Cortar el ruido con contenido claro, conciso y elaborado por expertos que cubra los fundamentos de las mejores prácticas.

What is a denial of service attack? Types and prevention

Equipo de expertos de Wiz

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What is zero trust architecture? A complete guide for cloud security

Equipo de expertos de Wiz

Enterprises have started gradually shifting from perimeter-based defenses to more proactive and identity-centric protection. Zero trust architecture eliminates implicit trust assumptions by requiring continuous verification of every user, device, and transaction.

What is SBOM scanning?

Equipo de expertos de Wiz

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Equipo de expertos de Wiz

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

Ver Wiz en acción

Wiz conecta los puntos a través de tu nube, desde el código hasta el tiempo de ejecución.

Para obtener información sobre cómo Wiz maneja sus datos personales, consulte nuestra Política de privacidad.

Wiz wand

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

CSPM in AWS

Equipo de expertos de Wiz

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

What is AWS vulnerability scanning?

Equipo de expertos de Wiz

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.

What is CVE scanning?

Equipo de expertos de Wiz

CVE scanning is the automated process of checking your software, systems, and networks against a database of known security flaws to identify vulnerabilities before attackers can exploit them.

What is container image scanning?

Equipo de expertos de Wiz

Container image scanning is the automated process of analyzing container images for security vulnerabilities, misconfigurations, and compliance violations.