Detection and Response

Understand how cloud threats are detected, investigated, and contained. These articles walk through telemetry sources, attack patterns, and practical workflows for fast, effective response.

What is a Honeypot in Cloud Security?

Équipe d'experts Wiz

A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.

SIEM vs SOAR: What is the real difference?

Équipe d'experts Wiz

The main difference is that SIEM focuses on detection and visibility, while SOAR focuses on response and automation. SIEM collects and analyzes vast amounts of log data, whereas SOAR acts on processed alerts and findings.

What does a SOC analyst in cloud security do?

Équipe d'experts Wiz

SOC analysts translate cloud telemetry into actionable decisions by interpreting identity activity, workload behavior, and infrastructure changes in context.

What is a denial of service attack? Types and prevention

Équipe d'experts Wiz

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

SecOps Explained

Équipe d'experts Wiz

SecOps is the collaborative integration of IT security and operations teams to protect and manage an organization's digital assets more efficiently.

How to Make Your Incident Response Framework Actionable

Équipe d'experts Wiz

An incident response framework is a blueprint that helps organizations deal with security incidents in a structured and efficient way. It outlines the steps to take before, during, and after an incident, and assigns roles and responsibilities to different team members.

What is Managed Threat Hunting?

Équipe d'experts Wiz

Managed threat hunting is a proactive security service where experts search for hidden threats automated tools miss, reducing dwell time and potential damage.

What is SOC threat hunting?

Équipe d'experts Wiz

SOC threat hunting is a proactive cybersecurity practice where analysts actively search for signs of malicious activity that bypass traditional security controls.

DevSecOps vs DevOps: Key differences & Comparison

Équipe d'experts Wiz

DevOps is a way of working that breaks down walls between development and operations teams. This means developers and IT operations work together instead of in separate silos, which helps companies build and release software faster.

Threat hunting vs threat intelligence: Key differences

Équipe d'experts Wiz

Threat hunting actively searches for hidden threats already inside your network, while threat intelligence gathers external information about potential threats to inform security strategy.

Incident response plan testing for cloud security

Équipe d'experts Wiz

Incident response plan testing is essential for cloud-native organizations because it goes far beyond checking a box—it’s about proving your team’s ability to handle the unpredictable nature of real attacks.

Top Incident Response Certifications for Aspiring Responders

Équipe d'experts Wiz

Incident response certifications are professional credentials that prove you can handle security breaches when they happen. These certifications show employers that you know how to detect threats, contain damage, and get systems back to normal after an attack.

Top OSS Incident Response Tools

Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.

MDR vs. SOC: What's the difference?

Équipe d'experts Wiz

A SOC manages cloud and on-premises security with complete oversight. On the other hand, MDR is an external service that provides cloud-focused threat detection and response, offloads operational complexity, and offers flexibility without internal resource expansion.

What is Alert Fatigue in Cybersecurity?

Alert fatigue, sometimes known as alarm fatigue, happens when security team members are desensitized by too many notifications, leading them to miss critical signals and legitimate warnings.

Malware Detection: Tools and Techniques

Équipe d'experts Wiz

To defend against malware in the cloud, businesses need a detection and response solution that’s built for the cloud, fluent in cloud-based indicators of compromise (IOCs), and enriched by cloud threat intelligence.

What is SOCaaS?

Équipe d'experts Wiz

SOCaaS outsources threat detection, investigation, and response for cost savings, scalable operations, and on-demand expertise.

What is Identity Threat Detection and Response (ITDR)?

Identity threat detection and response (ITDR) is a cybersecurity approach that uses a combination of tools, intelligence, and automation to proactively detect, investigate, and respond to threats targeting digital identities and authentication systems in the cloud.

Social Engineering Attacks: Types + Examples

Équipe d'experts Wiz

Social engineering is an attack technique that focuses on exploiting an enterprise’s employees. In a typical social engineering scenario, cybercriminals may trick or deceive employees into ignoring security protocols, making them unwitting collaborators in cyberattacks.

What is Anomaly Detection?

In this post, we’ll look at where anomaly detection fits into your cybersecurity big picture, some common techniques and use cases, as well as some tips on rolling out anomaly detection without adding to your teams’ workload.

What is Managed Detection and Response (MDR)?

In this post, we’ll look at some of the differences between MDR and traditional managed services, how MDR functions within organizations, some of the tools it works with for even more effective threat detection and response, and the most important tip for getting the most out of your MDR solution.

What is Detection Engineering?

Detection engineering is a structured approach to developing, implementing, and refining threat detection mechanisms that’s tailored to an organization’s specific environment.

NOC vs. SOC

Équipe d'experts Wiz

In this post, we’ll explore similarities and differences between the NOC and SOC. Then we’ll take a look at some tools that help NOCs and SOCs accomplish their core functions—as well as some tips for overcoming the main challenges to their smooth operation within your organization.

10 Open-Source SOC tools

Équipe d'experts Wiz

Cloud security operations center (SOC) tools are the security solutions used by SOC teams to track and triage threats and vulnerabilities in cloud environments.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

MTTD and MTTR in Cybersecurity Incident Response

Most incident response teams measure both MTTD and MTTR to not only shorten attackers’ dwell times in their systems but also to gauge the team’s readiness to combat future security incidents and then optimize response times.

What is Cloud Threat Modeling?

Cloud threat modeling is a systematic approach designed to uncover, evaluate, and rank the potential security vulnerabilities and dangers unique to cloud-based systems and infrastructure.

Security logs

Cloud security logs are formatted text records that capture events and activities as they occur in a cloud environment, providing insight into what’s happening within that environment in real time.

The SOC Team Roster: Roles & responsibilities

Équipe d'experts Wiz

A security operations center (SOC) team is a group of highly skilled professionals responsible for scanning IT environments and identifying and remediating cybersecurity threats and incidents

What is Cloud Forensics?

Cloud forensics is a branch of digital forensics that applies investigative techniques to collecting and evaluating critical evidence in cloud computing environments following a security incident.

What is Credential Access (TA0006)?

Équipe d'experts Wiz

Credential access is a cyberattack technique where threat actors access and hijack legitimate user credentials to gain entry into an enterprise's IT environments.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

What is a Reverse Shell Attack?

Équipe d'experts Wiz

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.