Académie CloudSec

Bienvenue à l'académie CloudSec, votre guide pour naviguer dans l'océan des acronymes de sécurité cloud et le jargon de l'industrie. Simplifiez-vous la vie grâce à un contenu clair, concis et rédigé par des experts, qui couvre les principes fondamentaux et les bonnes pratiques.

Risques de sécurité Azure et mesures d'atténuation

Équipe d'experts Wiz

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

Que sont les cadres de sécurité applicative ?

Équipe d'experts Wiz

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

Voir Wiz en action

Wiz relie les points à travers votre cloud, du code au runtime.

Pour plus d’informations sur la façon dont Wiz traite vos données personnelles, veuillez consulter notre Politique de confidentialité.

Wiz wand

What is a denial of service attack? Types and prevention

Équipe d'experts Wiz

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What is SBOM scanning?

Équipe d'experts Wiz

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Équipe d'experts Wiz

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

CSPM sur AWS

Équipe d'experts Wiz

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

SAST vs. SCA : quelle différence ?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

What is AWS vulnerability scanning?

Équipe d'experts Wiz

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.