Shaked Rotlevi

Shaked is a Technical Product Marketing Manager (PMM) focused on Wiz's core capabilities, including CSPM, CIEM, and Vulnerability Management which help organizations establish a secure foundation in the cloud. Previously, she's been part of Public Sector Solutions Architecture team at AWS as well as a Technical Program Manager on the AWS Config team. Outside work, Shaked loves playing volleyball, surfing and anything outdoors.

Shaked Rotlevi Articoli

13 Essential Data Security Best Practices in the Cloud

Cloud data security is the practice of safeguarding sensitive data, intellectual property, and secrets from unauthorized access, tampering, and data breaches. It involves implementing security policies, applying controls, and adopting technologies to secure all data in cloud environments.

What is Data Risk Management?

Data risk management involves detecting, assessing, and remediating critical risks associated with data. We're talking about risks like exposure, misconfigurations, leakage, and a general lack of visibility.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

What is Data Flow Mapping?

In this article, we’ll take a closer look at everything you need to know about data flow mapping: its huge benefits, how to create one, and best practices, and we’ll also provide sample templates using real-life examples.

Data Security Compliance Explained

Data security compliance is a critical aspect of data governance that involves adhering to the security-centric rules and regulations set forth by supervisory and regulatory bodies, including federal agencies.

Data Leakage: rischi, cause e prevenzione

La perdita di dati è l'esfiltrazione incontrollata di dati dell'organizzazione a terzi. Si verifica attraverso vari mezzi come database configurati in modo errato, server di rete scarsamente protetti, attacchi di phishing o persino una gestione negligente dei dati.

Vulnerability Prioritization in the Cloud: Strategies + Steps

Vulnerability prioritization is the practice of assessing and ranking identified security vulnerabilities based on critical factors such as severity, potential impact, exploitability, and business context. This ranking helps security experts and executives avoid alert fatigue to focus remediation efforts on the most critical vulnerabilities.

AI Risk Management: Essential AI SecOps Guide

AI risk management is a set of tools and practices for assessing and securing artificial intelligence environments. Because of the non-deterministic, fast-evolving, and deep-tech nature of AI, effective AI risk management and SecOps requires more than just reactive measures.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

Che cosa è il CSPM?

Cloud Security Posture Management (CSPM) descrive il processo di rilevamento e correzione continui dei rischi negli ambienti e nei servizi cloud (ad esempio bucket S3 con accesso di lettura pubblico). Gli strumenti CSPM valutano automaticamente le configurazioni cloud rispetto alle best practice del settore, ai requisiti normativi e alle policy di sicurezza per garantire che gli ambienti cloud siano sicuri e gestiti correttamente.

Strumenti di sicurezza AI: il toolkit open source

Faremo un'immersione profonda nel panorama degli strumenti MLSecOps esaminando le cinque aree fondamentali di MLSecOps, esplorando la crescente importanza di MLSecOps per le organizzazioni e introducendo sei interessanti strumenti open source da provare

Che cos'è la conformità al cloud (Cloud Compliance)?

La conformità al cloud è la serie di procedure, controlli e misure organizzative che è necessario mettere in atto per garantire che le risorse basate sul cloud soddisfino i requisiti delle normative, degli standard e dei framework di protezione dei dati rilevanti per l'organizzazione.

Shaked Rotlevi Messaggi

Wiz at Re:Invent 2024

See what’s new with Wiz at Re:Invent 2024 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure

Wiz at Re:Invent 2023

See what’s new with Wiz at Re:Invent 2023 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure.

Wiz at Re:Inforce 2023

See what is new with Wiz at Re:Inforce and learn about how Wiz and AWS continue to strengthen a strategic relationship to secure customers’ AWS environments.