Wiz Defend est là : détection et réponse aux menaces pour le cloud

Shaked Rotlevi

Shaked is a Technical Product Marketing Manager (PMM) focused on Wiz's core capabilities, including CSPM, CIEM, and Vulnerability Management which help organizations establish a secure foundation in the cloud. Previously, she's been part of Public Sector Solutions Architecture team at AWS as well as a Technical Program Manager on the AWS Config team. Outside work, Shaked loves playing volleyball, surfing and anything outdoors.

Articles Shaked Rotlevi

What is Data Flow Mapping?

In this article, we’ll take a closer look at everything you need to know about data flow mapping: its huge benefits, how to create one, and best practices, and we’ll also provide sample templates using real-life examples.

Data Security Compliance Explained

Data security compliance is a critical aspect of data governance that involves adhering to the security-centric rules and regulations set forth by supervisory and regulatory bodies, including federal agencies.

Data Leakage: Risks, Causes, & Prevention

Data leakage is the unchecked exfiltration of organizational data to a third party. It occurs through various means such as misconfigured databases, poorly protected network servers, phishing attacks, or even careless data handling.

Vulnerability Prioritization in the Cloud: Strategies + Steps

Vulnerability prioritization is the practice of assessing and ranking identified security vulnerabilities based on critical factors such as severity, potential impact, exploitability, and business context. This ranking helps security experts and executives avoid alert fatigue to focus remediation efforts on the most critical vulnerabilities.

AI Risk Management: Essential AI SecOps Guide

AI risk management is a set of tools and practices for assessing and securing artificial intelligence environments. Because of the non-deterministic, fast-evolving, and deep-tech nature of AI, effective AI risk management and SecOps requires more than just reactive measures.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

Qu'est-ce que le CSPM ?

La gestion de la posture de sécurité du cloud (CSPM) est la pratique consistant à surveiller, détecter et corriger en permanence les risques de sécurité et les violations de conformité dans les environnements cloud.

AI Security Tools: The Open-Source Toolkit

We’ll take a deep dive into the MLSecOps tools landscape by reviewing the five foundational areas of MLSecOps, exploring the growing importance of MLSecOps for organizations, and introducing six interesting open-source tools to check out

Qu’est-ce que la conformité cloud (Cloud Compliance)?

La conformité au cloud est l’ensemble des procédures, des contrôles et des mesures organisationnelles que vous devez mettre en place pour vous assurer que vos ressources basées sur le cloud répondent aux exigences des réglementations, normes et cadres de protection des données pertinents pour votre organisation.

Posts Shaked Rotlevi

Wiz at Re:Invent 2024

See what’s new with Wiz at Re:Invent 2024 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure

Wiz at Re:Invent 2023

See what’s new with Wiz at Re:Invent 2023 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure.

Wiz at Re:Inforce 2023

See what is new with Wiz at Re:Inforce and learn about how Wiz and AWS continue to strengthen a strategic relationship to secure customers’ AWS environments.