CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

What is SIEM? The cloud-native security evolution

Wiz エキスパートチーム

SIEM stands for Security Information and Event Management. It is a unified platform that combines Security Information Management (SIM) and Security Event Management (SEM).

SIEM vs SOAR: What is the real difference?

Wiz エキスパートチーム

The main difference is that SIEM focuses on detection and visibility, while SOAR focuses on response and automation. SIEM collects and analyzes vast amounts of log data, whereas SOAR acts on processed alerts and findings.

Wiz の実際の動作を見る

Wiz は、コードからランタイムまで、クラウド全体の点と点をつなぎます。

Wiz がお客様の個人データをどのように取り扱うかについては、当社のプライバシーポリシーをご確認下さい: プライバシーポリシー.

Wiz wand

Kubernetes engineer job description

Wiz エキスパートチーム

A Kubernetes engineer is a specialized tech role responsible for the design, deployment, and maintenance of container orchestration platforms.

14 OSS Application Security Tools by Use Case

The top 14 open-source application security tools—including SCA, secrets scanning, and application security testing tools—to help you streamline the critical process of securing your apps from threats and vulnerabilities.

CI/CD security tools

CI/CD security tools automate security checks in development pipelines to identify vulnerabilities and misconfigurations during code changes, ensuring continuous security.

What is dependency scanning in cloud security?

Wiz エキスパートチーム

Dependency scanning is the automated analysis of the third-party libraries, frameworks, and packages that developers use to build applications.

What is Azure container security scanning?

Wiz エキスパートチーム

Azure Container Security Scanning finds vulnerabilities and misconfigurations in container images and workloads in Azure Container Registry and AKS.

What is DAST scanning? A cloud security perspective

Wiz エキスパートチーム

DAST scanning is an automated security testing method that analyzes your running applications from the outside. It interacts with the application just like a real user or attacker would to find security weaknesses.