CloudSec Academy

Benvenuto in CloudSec Academy, la tua guida per navigare nella zuppa alfabetica degli acronimi sulla sicurezza del cloud e del gergo del settore. Elimina il rumore con contenuti chiari, concisi e realizzati da esperti che coprono i fondamenti e le best practice.

Top OSS Incident Response Tools

Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.

Guarda la demo di 12 minuti

Guarda come Wiz trasforma la visibilità istantanea in una rapida bonifica.

Per informazioni su come Wiz gestisce i tuoi dati personali, consulta il nostro Informativa sulla privacy.

Wiz starWiz starWiz starWiz star

Security logs

Cloud security logs are formatted text records that capture events and activities as they occur in a cloud environment, providing insight into what’s happening within that environment in real time.

What is cloud native?

Team di esperti Wiz

Cloud native is a modern approach to building and running applications that fully exploits the advantages of cloud computing, including on-demand scalability, resilience, and automation.

What is continuous pen testing? A cloud security perspective

Team di esperti Wiz

Continuous penetration testing is an always-on, adversarial security testing approach that persistently discovers, exploits, and validates vulnerabilities across your environment rather than testing at a single point in time.

What is a SOAP API? Security and implementation

Simple Object Access Protocol (SOAP) is an XML-based messaging protocol standardized by W3C that’s popular for its predictability, strict contracts, and strong security features. The protocol is the basis for SOAP APIs: The SOAP protocol defines the rules, and SOAP APIs are the actual implementations of those rules.

Sicurezza del codice (Code Security)

La sicurezza del codice, nota anche come codifica sicura, si riferisce alle pratiche, alle metodologie e agli strumenti progettati per garantire che il codice scritto per applicazioni e sistemi sia protetto da vulnerabilità e minacce.