CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

Application security engineer career guide

Wiz エキスパートチーム

An application security engineer (AppSec engineer) secures the software development lifecycle by integrating security practices into design, code, and deployment workflows.

Top threat intelligence platforms in 2026

Threat intelligence platforms (TIPs) aggregate attacker data from OSINT, dark web sources, commercial feeds, and adversary infrastructure to highlight the threats most likely to be exploited.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

12 分間のデモを見る

Wizが即時の可視性を迅速な修復に変える様子をご覧ください。

Wiz がお客様の個人データをどのように取り扱うかについては、当社のプライバシーポリシーをご確認下さい: プライバシーポリシー.

Wiz starWiz starWiz starWiz star

CIEMとIAMの比較

Wiz エキスパートチーム

この記事では、CIEMとIAMを比較し、これらの重要な手法が攻撃対象領域の縮小にどのように役立つかを説明します。

Cloud Sprawl Explained

Wiz エキスパートチーム

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

What Is a Reverse Shell Attack?

Wiz エキスパートチーム

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

What is application penetration testing?

Wiz エキスパートチーム

Application penetration testing is a simulated cyberattack against a software application designed to identify exploitable security vulnerabilities before malicious actors do.

What is Cloud Observability?

Wiz エキスパートチーム

Cloud observability for security means understanding your cloud's state and behavior using connected telemetry, not just logs.

Kubernetes Ingress: Controllers, routing, and security

Wiz エキスパートチーム

Kubernetes Ingress is an API object that routes external HTTP/HTTPS traffic to multiple backend services, typically behind a shared external entry point, by mapping the HTTP Host header and URL path to specific internal services.

Kubernetes Vulnerability Scanning

Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.

Guide to Standard SBOM Formats

Wiz エキスパートチーム

Two major formats dominate the SBOM ecosystem: Software Package Data Exchange (SPDX) and CycloneDX (CDX). Let’s review!