Académie CloudSec

Bienvenue à l'académie CloudSec, votre guide pour naviguer dans l'océan des acronymes de sécurité cloud et le jargon de l'industrie. Simplifiez-vous la vie grâce à un contenu clair, concis et rédigé par des experts, qui couvre les principes fondamentaux et les bonnes pratiques.

What is internal vulnerability scanning?

Équipe d'experts Wiz

Internal vulnerability scanning is the process of identifying security weaknesses within an organization’s internal network infrastructure.

Top 9 OSS API Security Tools

Équipe d'experts Wiz

A guide on the 9 best OSS API security tools that protect sensitive data, infrastructure, and business logic from unauthorized access, data theft, and other attacks.

Voir Wiz en action

Wiz relie les points à travers votre cloud, du code au runtime.

Pour plus d’informations sur la façon dont Wiz traite vos données personnelles, veuillez consulter notre Politique de confidentialité.

Wiz wand

AWS Budgets vs. Cost Explorer: Why you need both

Équipe d'experts Wiz

This article will help you understand the benefits of using both tools together, along with a solution like Wiz to fill the cross-cloud visibility gap and optimize both costs and security.

How to Evaluate Wiz: Common FAQs

Équipe d'experts Wiz

This FAQ is designed to help teams evaluate whether Wiz is the right cloud security solution for them by answering the most common technical, strategic, and logistical questions.

Attack surface discovery: From blind spots to visibility

Équipe d'experts Wiz

Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).

Container runtime scanning best practices

Équipe d'experts Wiz

Runtime scanning answers a critical question: 'What is runtime security for containers?' It focuses on detecting live behaviors, active threats, and anomalies that only appear when containers execute under real production traffic.

Source code scanning best practices for cloud security

Équipe d'experts Wiz

Source code scanning is automated analysis of your code, dependencies, and infrastructure definitions to find security issues before you deploy. This means a tool reads your code the way a careful reviewer would, but at high speed and at scale.

How to implement CI/CD security scanning: Best practices

Équipe d'experts Wiz

CI/CD security scanning is the practice of adding automated security checks into your build and deployment pipelines. This means every meaningful code change is tested for risk before it can reach production.

What is external vulnerability scanning?

Équipe d'experts Wiz

External vulnerability scanning is a way to find weaknesses in your public-facing systems by testing them from outside your network. This means you see your environment the same way an attacker on the internet would see it.

Attack surfaces vs. attack vectors: What security teams need to know

Équipe d'experts Wiz

This blog post will explain strategies for attack surface management (ASM) that integrate both attack surface reduction and attack vector defense into one continuous process, helping you meet the requirements of leading security frameworks like Gartner’s Continuous Threat Exposure Management (CTEM) framework.