CloudSec Academy
Benvenuto in CloudSec Academy, la tua guida per navigare nella zuppa alfabetica degli acronimi sulla sicurezza del cloud e del gergo del settore. Elimina il rumore con contenuti chiari, concisi e realizzati da esperti che coprono i fondamenti e le best practice.
Guarda Wiz in azione
Scopri come Wiz trasforma i fondamenti della sicurezza cloud in risultati reali.
How to secure the SDLC with Wiz
Learn how to secure the SDLC from code to runtime with DevSecOps best practices: SAST, SCA, IaC scanning, CI/CD hardening, CSPM, CDR, and compliance mapping.
GraphQL API security risks every developer should know about
GraphQL API security is a set of specialized practices and controls for protecting GraphQL endpoints.
Unmanaged API security: What cloud teams need to know
Unmanaged APIs are undocumented interfaces that operate outside standardized security and governance frameworks.
Guarda Wiz in azione
Wiz collega i punti nel tuo cloud, dal codice al Runtime.
API security posture management explained
API security posture management, or API-SPM, is a security discipline that focuses on maintaining and proactively improving the security health of enterprise APIs.
The Open-Source CNAPP Toolkit
With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.
Cloud engineer job description (template, skills, salary)
A cloud engineer is a technical expert responsible for architecting, implementing, and managing an organization's cloud infrastructure and services. This role involves working across the full cloud lifecycle, from initial planning and design to deployment and ongoing optimization.
10 Cloud engineer interview questions for hiring managers
This list of questions helps you reveal a candidate's technical capability and their security mindset. Use these prompts to uncover whether candidates can apply context by linking code, identities, infrastructure, and data to prioritize what truly matters.
Che cos'è l'ASPM? [Application Security Posture Management]
La gestione del comportamento di sicurezza delle applicazioni comporta la valutazione continua delle minacce e dei rischi e delle vulnerabilità durante l'intero ciclo di vita dello sviluppo del software (SDLC).
Che cosa è il CSPM?
Cloud Security Posture Management (CSPM) descrive il processo di rilevamento e correzione continui dei rischi negli ambienti e nei servizi cloud (ad esempio bucket S3 con accesso di lettura pubblico). Gli strumenti CSPM valutano automaticamente le configurazioni cloud rispetto alle best practice del settore, ai requisiti normativi e alle policy di sicurezza per garantire che gli ambienti cloud siano sicuri e gestiti correttamente.
What is a Honeypot in Cloud Security?
A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.
Che cos'è il DSPM? [Data Security Posture Management]
La gestione della postura di sicurezza dei dati (DSPM) è una soluzione progettata per monitorare continuamente le politiche e le procedure di sicurezza dei dati di un'organizzazione per rilevare vulnerabilità e potenziali rischi.
Cloud Application Security: Basics and Best Practices
Cloud app security involves ensuring that both cloud-native and cloud-based apps are protected from vulnerabilities through the use of proper tools and practices.
Unpacking Data Security Policies
A data security policy is a document outlining an organization's guidelines, rules, and standards for managing and protecting sensitive data assets.
How to patch container base images: Methods and best practices
Container base image patching is the process of updating the OS and runtime libraries in the base layer of a container image to remediate vulnerabilities and keep images secure.
Scansione delle vulnerabilità (Vulnerability Scanning)
La scansione delle vulnerabilità è il processo di rilevamento e valutazione delle falle di sicurezza nei sistemi IT, nelle reti e nel software.
Cloud storage costs and secure optimization
Cloud storage cost refers to the total expense associated with storing, accessing, and managing data across cloud platforms like AWS S3, Azure Blob Storage, and Google Cloud Storage.