CloudSec Academy
Benvenuto in CloudSec Academy, la tua guida per navigare nella zuppa alfabetica degli acronimi sulla sicurezza del cloud e del gergo del settore. Elimina il rumore con contenuti chiari, concisi e realizzati da esperti che coprono i fondamenti e le best practice.
Guarda Wiz in azione
Scopri come Wiz trasforma i fondamenti della sicurezza cloud in risultati reali.
I migliori strumenti di gestione delle vulnerabilità OSS
8 strumenti open source di gestione delle vulnerabilità e le loro funzionalità, classificati per caso d'uso
The Best Open-Source API Security Tools and When to Use Them
Discover top OSS API security testing tools. See how Wiz’s Dynamic Scanner delivers complete visibility, runtime protection, and contextual risk analysis.
Guarda Wiz in azione
Wiz collega i punti nel tuo cloud, dal codice al Runtime.
What is CVE scanning?
CVE scanning is the automated process of checking your software, systems, and networks against a database of known security flaws to identify vulnerabilities before attackers can exploit them.
What is container image scanning?
Container image scanning is the automated process of analyzing container images for security vulnerabilities, misconfigurations, and compliance violations.
What is API scanning?
API scanning is the automated process of analyzing APIs to detect security vulnerabilities, misconfigurations, and logic flaws.
What is SAST scanning? How it works in cloud development
SAST scanning, or Static Application Security Testing, is a "white-box" testing method that analyzes your application's source code, bytecode, or binaries to find security flaws
Penetration Testing vs Vulnerability Scanning: What's the Difference?
Penetration Testing vs Vulnerability Scanning: Penetration testing simulates attacks to exploit flaws while vulnerability scanning identifies known risks.
What is internal vulnerability scanning?
Internal vulnerability scanning is the process of identifying security weaknesses within an organization’s internal network infrastructure.
What is attack surface scanning? A complete guide
Attack surface scanning is the process of continuously discovering and monitoring internet-facing assets to identify entry points attackers can exploit.
Agentless scanning vs. agent-based scanning compared
Agentless scanning vs agent-based scanning compares API-based assessments requiring no software installation with host-based agents for deep runtime visibility
AWS Budgets vs. Cost Explorer: Why you need both
This article will help you understand the benefits of using both tools together, along with a solution like Wiz to fill the cross-cloud visibility gap and optimize both costs and security.
How to Evaluate Wiz: Common FAQs
This FAQ is designed to help teams evaluate whether Wiz is the right cloud security solution for them by answering the most common technical, strategic, and logistical questions.
Container Monitoring: Top Tools, Best Practices, Challenges
Container monitoring is the process of collecting, analyzing, and reporting metrics and data related to the performance and health of containerized applications and their hosting environments.
Attack surface discovery: From blind spots to visibility
Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).