CloudSec Academy

Benvenuto in CloudSec Academy, la tua guida per navigare nella zuppa alfabetica degli acronimi sulla sicurezza del cloud e del gergo del settore. Elimina il rumore con contenuti chiari, concisi e realizzati da esperti che coprono i fondamenti e le best practice.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

CIEM contro IAM

Team di esperti Wiz

In questo articolo, confronteremo CIEM e IAM per spiegare come queste tecniche cruciali aiutano a ridurre la superficie di attacco.

Cloud Sprawl Explained

Team di esperti Wiz

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

Guarda la demo di 12 minuti

Guarda come Wiz trasforma la visibilità istantanea in una rapida bonifica.

Per informazioni su come Wiz gestisce i tuoi dati personali, consulta il nostro Informativa sulla privacy.

Wiz starWiz starWiz starWiz star

What is a Reverse Shell Attack?

Team di esperti Wiz

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

What is application penetration testing?

Team di esperti Wiz

Application penetration testing is a simulated cyberattack against a software application designed to identify exploitable security vulnerabilities before malicious actors do.

Kubernetes Ingress: Controllers, routing, and security

Team di esperti Wiz

Kubernetes Ingress is an API object that routes external HTTP/HTTPS traffic to multiple backend services, typically behind a shared external entry point, by mapping the HTTP Host header and URL path to specific internal services.

Kubernetes Vulnerability Scanning

Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.

Guide to Standard SBOM Formats

Team di esperti Wiz

Two major formats dominate the SBOM ecosystem: Software Package Data Exchange (SPDX) and CycloneDX (CDX). Let’s review!

The AI Cybersecurity Company Landscape

Team di esperti Wiz

The right AI cybersecurity software for you depends on your real-world needs: posture management, noise reduction, automation, and unification with your existing cloud stack.