CloudSec

Get grounded in the core concepts of cloud security. These articles cover foundational models, shared responsibility, architectural risks, and cross-cloud practices that help secure any environment.

What is SIEM? The cloud-native security evolution

Équipe d'experts Wiz

SIEM stands for Security Information and Event Management. It is a unified platform that combines Security Information Management (SIM) and Security Event Management (SEM).

9 Best Practices for Stronger Azure Security

Équipe d'experts Wiz

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Équipe d'experts Wiz

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

CSPM in AWS

Équipe d'experts Wiz

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

What is AWS vulnerability scanning?

Équipe d'experts Wiz

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.

How to Evaluate Wiz: Common FAQs

Équipe d'experts Wiz

This FAQ is designed to help teams evaluate whether Wiz is the right cloud security solution for them by answering the most common technical, strategic, and logistical questions.

Attack surface discovery: From blind spots to visibility

Équipe d'experts Wiz

Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).

Attack surfaces vs. attack vectors: What security teams need to know

Équipe d'experts Wiz

This blog post will explain strategies for attack surface management (ASM) that integrate both attack surface reduction and attack vector defense into one continuous process, helping you meet the requirements of leading security frameworks like Gartner’s Continuous Threat Exposure Management (CTEM) framework.

Agentless scanning best practices for cloud security

Équipe d'experts Wiz

Agentless scanning inspects cloud environments for security risks without installing software agents on workloads, using cloud provider APIs and snapshot analysis instead

What is runtime cloud security?

Équipe d'experts Wiz

Successful security programs utilize runtime signal analysis with cloud context to eliminate unnecessary alerts and focus on exploitable threats—active malicious behaviors, suspicious identity patterns, and attack paths—not just static vulnerabilities.

How to strengthen cloud security for small businesses

Équipe d'experts Wiz

Despite the costs and challenges involved, achieving solid cloud network defenses is an opportunity for SMBs to reinforce cloud operations and maximize their cloud investments.

Serverless Security Explained

Équipe d'experts Wiz

Serverless security is the extra layer of protection designed for applications built on a serverless architecture. In this type of cloud computing, you write the code (functions) but the cloud provider handles the servers. This creates a different security approach.

What is CTEM (Continuous Threat Exposure Management)?

Continuous Threat Exposure Management (CTEM) has emerged as a proactive approach to cybersecurity, enabling security teams to identify, assess, and mitigate threats—in real-time, which is key. However, despite its growing popularity, there are still many questions surrounding CTEM. In this blog post, we'll delve into the top seven questions that cybersecurity practitioners often ask about CTEM—see if you’ve been looking for answers to these yourself!

What is cloud security testing?

Cloud security testing is the process of evaluating your entire cloud infrastructure for security risks and misconfigurations—proactively, systematically, and continuously.

CSPM in Azure

Équipe d'experts Wiz

All major cloud providers have adopted a CSPM solution to help organizations handle their part of the shared responsibility model. In Azure, CSPM is a critical component in making sure your infrastructure is secure, compliant, and resilient to cybersecurity threats.

The top 7 Cloud Security Solutions

Équipe d'experts Wiz

The difference between market leaders and niche solutions? Comprehensive coverage without operational compromises. This post provides a practical blueprint for judging those claims and selecting technology that truly fits your organization.

What is Cyber Asset Attack Surface Management (CAASM)?

Cyber asset attack surface management (CAASM) is a security practice that gives teams unified visibility and control over all enterprise assets—cloud, SaaS, on-prem, and beyond. It helps eliminate blind spots and reduce risk by correlating asset data from across your environment and tools. CAASM enables teams to query, prioritize, and act from a single source of truth.

What is Attack Surface Analysis?

Équipe d'experts Wiz

Attack surface analysis is a cybersecurity practice that identifies and evaluates all potential access points, external and internal, that an attacker could exploit.

On-Premise vs. Cloud Security

Équipe d'experts Wiz

Let's compare on-premises and cloud security, examine their differences, and explore key cloud-specific security concepts to help you choose the best approaches to security for your entire organization.

CIEM Solutions: Options to Consider

Équipe d'experts Wiz

Smart CIEM beats basic visibility. The best platforms prioritize real attack paths and provide actionable fixes, not just permission inventories.

ABAC vs. RBAC: What’s the difference?

Équipe d'experts Wiz

Choosing between role-based access control (RBAC) and attribute-based access control (ABAC) sets up how your cloud stack determines who may do what, where, and when. This blog post shows you the functional differences between the two models.

What is a VPC?

Équipe d'experts Wiz

A VPC is a logically isolated private network within a public cloud that users can fully configure.

How to Choose a CNAPP: A Security Leader’s Cheat Sheet

Équipe d'experts Wiz

In this guide, we’ll show you how to choose a CNAPP that cuts through complexity and gives your team a real path to security: with full-stack visibility, runtime protection, and developer-friendly workflows.

How to Evaluate CSP security: A Checklist

Équipe d'experts Wiz

Cloud service providers offer on-demand, scalable computing resources like storage services, applications, and cloud-based compute. Using a structured checklist can help your business select a cloud provider that has the features you need to meet your security goals.

What is Unauthorized Access?

Équipe d'experts Wiz

Unauthorized access refers to any successful or attempted access to systems, services, or data without the proper permissions. These incidents can result from misconfigurations, credential theft, or flaws in identity and access management—and often go unnoticed without proper detection mechanisms in place.

What is a Cloud Security Audit?

Équipe d'experts Wiz

Aimed at verifying security, compliance, and operational resilience, a cloud security audit is a structured evaluation of an organization's cloud environments, infrastructure, configurations, access controls, and security policies.

CSPM vs. CWPP: Should You Use One or Both?

Équipe d'experts Wiz

Explore CWPP vs. CSPM to learn more about their roles and differences and why a unified CNAPP may offer the best cloud security strategy for your organization.

Cloud Service Providers: Choosing the Right Platform

Équipe d'experts Wiz

Cloud service providers (CSPs) are companies that offer on-demand computing resources—including servers, storage, databases, and networking—hosted in the cloud and accessible through the web.

CNAPP vs. ASPM: What’s the Difference?

Équipe d'experts Wiz

This article breaks down the relationship between CNAPPs and ASPM, clarifies how they overlap, and explains why organizations benefit most from a platform that brings both together.

Managed Cloud Security

Équipe d'experts Wiz

Managed cloud security helps organizations scale protection across cloud environments by outsourcing key operations like detection, response, and compliance monitoring.

The Modern Cloud Security Maturity Model

Équipe d'experts Wiz

A maturity model isn’t just a framework—it’s your roadmap to evolving beyond compliance checklists. Start with foundational controls (like asset inventory and basic IAM hygiene) and progress to advanced practices like threat modeling and runtime protection.

The Top 5 CNAPP benefits you need to know in 2026

Équipe d'experts Wiz

A CNAPP, or Cloud Native Application Protection Platform, is an integrated security solution that unifies multiple cloud security capabilities—like CSPM, CWPP, CIEM, and IaC scanning—into a single platform.

Exposure Management vs. Vulnerability Management: What’s the difference?

Équipe d'experts Wiz

Both approaches are unique, but they function as complementary cybersecurity frameworks for managing threats and vulnerabilities in modern IT systems. Together, EM and VM are essential for minimizing your attack surface, ensuring regulatory compliance, and preventing breaches.

Top Azure Security Tools By Category

Équipe d'experts Wiz

Explore the top Azure security tools by category, from compliance and threat detection to network protection, so you can achieve strong cloud security.

Private vs. Public Cloud: What’s the Difference?

Équipe d'experts Wiz

In this blog post, we’ll explore the differences between public and private cloud models and provide use cases and best practices to help you choose the best cloud strategy for your business.

What is SaaS Security?

Équipe d'experts Wiz

Software as a service (SaaS) refers to cloud-based software applications that can be accessed over the internet without any installation or maintenance on local devices.

CNAPP vs. CASB: What’s the difference?

Équipe d'experts Wiz

Both CNAPP and CASB protect enterprise IT environments, but businesses have to understand their differences, specifically in terms of focus, capabilities, and operationalization, to make an informed decision about which solution is better for them.

CNAPP vs. CDR: What's the Difference?

Équipe d'experts Wiz

While CDR and CNAPP are often discussed as separate approaches, CDR capabilities should be viewed as essential components within a comprehensive CNAPP strategy, not as competing alternatives.

Top 9 AWS Security Tools

Équipe d'experts Wiz

11 native tools for IAM, data protection, network and application protection, compliance management, and threat detection

What is Cloud Configuration Management?

Équipe d'experts Wiz

Cloud configuration management is the process of defining, enforcing, and maintaining consistent cloud resource configurations across environments. This includes automating deployment, monitoring compliance, preventing misconfigurations, and ensuring security, cost efficiency, and operational reliability.

Dissecting Cloud Attacks and Attack Vectors

Équipe d'experts Wiz

Cloud attacks are malicious activities that target cloud data and infrastructure. By exploiting cloud vulnerabilities, attackers try to access and tamper with cloud data by exfiltrating sensitive information or disrupting operations.

What Is Shadow IT? Causes, Risks, and Examples

Équipe d'experts Wiz

Shadow IT is an employee’s unauthorized use of IT services, applications, and resources that aren’t controlled by—or visible to—an organization’s IT department.

The Open-Source CNAPP Toolkit

Équipe d'experts Wiz

With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.

Identity Security [Cloud Edition]

Équipe d'experts Wiz

Cloud identity security is the practice of safeguarding digital identities and the sensitive cloud infrastructure and data they gatekeep from unauthorized access and misuse.

Effective Permissions: A Security Review

Équipe d'experts Wiz

In this article, we will explore the challenges of managing permissions, the risks associated with improper access controls, and how major cloud providers handle permissions. We’ll also take a look at best practices and advanced solutions like cloud infrastructure entitlement management (CIEM).

What is Cloud Risk Management?

Équipe d'experts Wiz

In this article, we’ll explore what cloud risk management entails and take an in-depth look at the tools that can keep your systems safe.

Defense in Depth: Cloud Edition

Équipe d'experts Wiz

Defense in depth is often considered a basic concept in any effective security strategy.

What is Cloud Visibility? + Best Practices

Équipe d'experts Wiz

As cloud adoption grows, the only way to mitigate risks and access the full spectrum of cloud capabilities is to prioritize visibility. Read on to learn more about cloud visibility—and how to achieve it.

Cloud Sprawl Explained

Équipe d'experts Wiz

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

CSPM vs DSPM: Why You Need Both

Équipe d'experts Wiz

Discover the similarities between CSPM and DSPM, what factors set them apart, and which one is the best choice for your organization’s needs.

Cloud Migration Security Explained

Cloud migration security is a facet of cybersecurity that protects organizations from security risks during a transition to cloud environments from legacy infrastructure, like on-premises data centers.

CSPM vs. SSPM

Équipe d'experts Wiz

This post discusses CSPM and SSPM in depth to reveal their respective use cases. You'll also learn how CSPM and SSPM complement each other to strengthen your overall security posture.

AWS Security Risks

Équipe d'experts Wiz

This article examines common AWS security challenges, including identity and access control gaps, data exposure risks, and monitoring blind spots.

CIEM vs. IAM

Équipe d'experts Wiz

In this article, we'll compare CIEM and IAM to explain how these crucial techniques help reduce your attack surface.

Understanding the Shared Responsibility Model

Équipe d'experts Wiz

The shared responsibility model is a framework establishing cloud security responsibilities between cloud service providers (AWS, GCP, Azure) and customers.

Cloud Security Strategy

Équipe d'experts Wiz

A cloud security strategy is the combination of the measures, tools, policies, and procedures used to secure cloud data, applications, and infrastructure.

What is Cloud Encryption?

Cloud encryption is the process of transforming data into a secure format that's unreadable to anyone who doesn't have the key to decode it.

CIEM vs CSPM: Why You Need Both

Équipe d'experts Wiz

CSPM focuses on securing cloud infrastructure by identifying and remediating misconfigurations, while CIEM centers on managing and securing user identities and access permissions within cloud environments, addressing threats related to unauthorized access and entitlements.

CNAPP vs CSPM

Équipe d'experts Wiz

Learn where CNAPP and CSPM overlap, where they differ, and which one is right for your organization.