Ziad Ghalleb
Ziad Ghalleb is a Technical Product Marketing Manager at Wiz, specializing in application security posture management and developer security. With over five years of experience in IT, Ziad has honed his expertise in developer tools, automation, and security, working with organizations in the secrets management and NHI security sectors. Outside work, you can find Ziad skateboarding in the streets of Paris and exploring its record stores!
Articles Ziad Ghalleb
14 OSS Application Security Tools by Use Case
The top 14 open-source application security tools—including SCA, secrets scanning, and application security testing tools—to help you streamline the critical process of securing your apps from threats and vulnerabilities.
SAST vs DAST : comment utiliser ces deux outils de test pour la sécurité applicative
In this Academy article, we'll dig into SAST and DAST security testing methods, exploring how they work and their core aspects
SAST vs. SCA : quelle différence ?
SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.
GitOps vs. DevOps: How GitOps Keeps You Aligned
While DevOps delineates collaboration and automation practices that emphasize infrastructure provisioning and continuous monitoring, GitOps extends its concepts by employing Git as the single source of truth for both application and infrastructure settings.
Top IaC Tools and Practices to Strengthen Code and Cloud Security
The best Infrastructure as Code (IaC) tools, curated by use case and categorized into CSP-specific and CSP-neutral providers.
What is a buffer overflow? Modern attacks and cloud security
A buffer overflow is a memory corruption vulnerability that allows threat actors to execute malicious code and take control of a program
Qu’est-ce qu’un test SAST ? [Tests de sécurité statique des applications]
Le test de sécurité statique des applications (SAST) est une méthode permettant d’identifier les vulnérabilités de sécurité dans le code source, le bytecode ou le code binaire d’une application avant que le logiciel ne soit déployé ou exécuté.
Analyse statique du code : sécurité, outils et bonnes pratiques
L’analyse statique du code détecte les vulnérabilités sans exécuter le code. Découvrez les outils SAST et leur rôle en DevSecOps.
Open-source security: Best practices and tools
Open-source security is the collection of tools and processes used to secure and manage the lifecycle of open-source software (OSS) and dependencies from development to production.
Exploring Snyk alternatives for cloud-native security teams
Snyk is a development security platform that supports risk identification and remediation across the application lifecycle. While it’s a capable tool for developer-centric use cases, there are crucial limitations when it comes to broader cloud security.
Secure Code Scanning: Basics & Best Practices
In this article, we’ll explore the step-by-step process of code scanning, its benefits, approaches, and best practices.
5 Essential Application Security Controls
Application security controls are technology-independent collections of policies, procedures, and standards to secure software, devices, users, network, and data.
What is Application Security testing?
Application security testing (AST) is a set of processes designed to detect and address security gaps during the early phases of the software development lifecycle (SDLC). In other words, teams take steps in pre-production to identify and mitigate risks before applications are released into operational environments.
6 All-Too-Common Code Vulnerabilities
Code vulnerabilities are weaknesses in software that attackers can exploit, potentially compromising security.
Qu’est-ce que la sécurité des applications (AppSec) ?
La sécurité des applications fait référence à la pratique consistant à identifier, atténuer et protéger les applications contre les vulnérabilités et les menaces tout au long de leur cycle de vie, y compris la conception, le développement, le déploiement et la maintenance.
Qu’est-ce que le codage sécurisé ? Vue d’ensemble et bonnes pratiques
Le codage sécurisé s’attaque rapidement aux vulnérabilités telles que les XSS et les fuites de mémoire, ce qui renforce la résilience des logiciels et réduit les risques.
What is Application Detection and Response (ADR)?
Application detection and response (ADR) is an approach to application security that centers on identifying and mitigating threats at the application layer.
Source Code Security: Basics and Best Practices
Source code security refers to the practice of protecting and securing the source code of an application from vulnerabilities, threats, and unauthorized access.
What is SecDevOps? + How It Differs From DevSecOps
SecDevOps is essentially DevOps with an emphasis on moving security further left. DevOps involves both the development team and the operations team in one process to improve deployment performance and service customers faster.
Secrets Detection: A Fast-Track Guide
Secrets detection is the process of identifying and managing sensitive information like API keys, passwords, and tokens within codebases to prevent unauthorized access and data breaches.
The Secure Software Development Framework (SSDF)
NIST’s Secure Software Development Framework (SSDF) is a structured approach that provides guidelines and best practices for integrating security throughout the software development life cycle (SDLC).
What is Security as Code (SaC)?
Security as Code (SaC) is a methodology that integrates security measures directly into the software development process. It involves codifying security policies and decisions, and automating security checks, tests, and gates within the DevOps pipeline.
Qu'est-ce que le Policy as Code ?
Le policy as code (PaC) consiste à utiliser du code pour définir, automatiser, appliquer et gérer les politiques qui régissent le fonctionnement des environnements cloud-native et de leurs ressources.
Posts Ziad Ghalleb
The Foundation Modern AppSec Is Still Missing: Code to Cloud, Rebuilt the Right Way
See every risk, from the first line of code to what’s running in production. No resource tagging. No CI/CD hacks. Just automatic, reliable traceability both developers and security teams can act on.
Secrets Found. Owners Identified. Issues Fixed.
Wiz closes the loop on exposed secrets with blast radius context, ownership intelligence, and actionable, AI-powered fixes.
The Overlooked Attack Surface: Securing Code Repositories, Pipelines, and Developer Infrastructure
Learn how Wiz for ASPM extends security to developer infrastructure by continuously enforcing secure defaults and detecting threats across the software supply chain.
Developers Deserve Better: Why Wiz Code Is Built for You.
Wiz Code helps developers integrate security into their workflow, with real-time guidance from code to cloud. Reduce last-minute fixes. Build with confidence.
Your control tower to secure code across GitHub, GitLab, and Azure Repos
Secure your code and the entire development pipeline with the Wiz Security Graph, comprehensive configuration checks, and advanced code scanning.
Sail Further with Wiz Cost Optimization for Amazon EKS
Learn how Wiz's latest feature identifies outdated EKS clusters, helping organizations save millions on cloud spend. Find out how to optimize costs and reinvest savings in strategic initiatives.