CloudSec Academy

Bienvenido a CloudSec Academy, tu guía para navegar por la sopa de alfabeto de los acrónimos de seguridad en la nube y la jerga de la industria. Cortar el ruido con contenido claro, conciso y elaborado por expertos que cubra los fundamentos de las mejores prácticas.

CNAPP vs. CDR: What's the Difference?

Equipo de expertos de Wiz

While CDR and CNAPP are often discussed as separate approaches, CDR capabilities should be viewed as essential components within a comprehensive CNAPP strategy, not as competing alternatives.

Data Categorization: Types, strategies, and steps

Equipo de expertos de Wiz

In this article, we'll explore the different types of data categorization, strategies for effective management, and how to avoid common pitfalls that can complicate cloud data governance.

AWS Security vs. Azure Security: Showdown for the Best Pick

Equipo de expertos de Wiz

To help you make an informed decision, we've crafted a comprehensive comparison of AWS and Azure security, empowering you to select the cloud provider that seamlessly integrates with your unique needs.

What is Cloud Configuration Management?

Equipo de expertos de Wiz

Cloud configuration management is the process of defining, enforcing, and maintaining consistent cloud resource configurations across environments. This includes automating deployment, monitoring compliance, preventing misconfigurations, and ensuring security, cost efficiency, and operational reliability.

Introduction to the NIST Cybersecurity Framework (CSF)

Equipo de expertos de Wiz

The NIST Cybersecurity Framework (CSF) is a risk-based framework designed to help organizations manage and reduce cybersecurity risks. It provides a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats.

Dissecting Cloud Attacks and Attack Vectors

Equipo de expertos de Wiz

Cloud attacks are malicious activities that target cloud data and infrastructure. By exploiting cloud vulnerabilities, attackers try to access and tamper with cloud data by exfiltrating sensitive information or disrupting operations.

What is CTEM (Continuous Threat Exposure Management)?

Continuous Threat Exposure Management (CTEM) has emerged as a proactive approach to cybersecurity, enabling security teams to identify, assess, and mitigate threats—in real-time, which is key. However, despite its growing popularity, there are still many questions surrounding CTEM. In this blog post, we'll delve into the top seven questions that cybersecurity practitioners often ask about CTEM—see if you’ve been looking for answers to these yourself!

Unified Vulnerability Management (UVM) Explained

Unified Vulnerability Management (UVM) has undergone a significant evolution in recent years, driven by technological advancements, changing threat landscapes, and increased regulatory demands. In this post, we explore how UVM has evolved and where we believe it’s headed in the next few years.

NIST 800-171: A Fast Track Guide

Equipo de expertos de Wiz

In this article, we’ll explore the ins and outs of NIST 800-171 compliance, including how it fits within the broader NIST standards and who needs to comply. We’ll also discuss some cloud security best practices to help you keep data safe.

¿Qué es la seguridad en la nube (cloud security)?

Equipo de expertos de Wiz

La seguridad en la nube se refiere a un conjunto de políticas, controles, procedimientos y tecnologías que trabajan juntos para proteger los sistemas, los datos y la infraestructura basados en la nube.