CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

The Open-Source Code Security Tool Roundup

Wiz エキスパートチーム

This article will give you a refresher on code security and review the most popular open-source code security tools available.

AKS Security Best Practices

Azure Kubernetes Service (AKS) delivers Kubernetes as a managed service in Azure and is popular among organizations looking for a hassle-free Kubernetes solution in the cloud.

Data Leakage:リスク、原因、防止

データ漏洩とは、組織データが第三者に対して野放しに持ち出されることです。 これは、データベースの設定ミス、ネットワークサーバーの保護が不十分な、フィッシング攻撃、さらには不注意なデータ処理など、さまざまな手段で発生します。

Top Vulnerability Management Solutions in 2025

Wiz エキスパートチーム

Modern vulnerability management is evolving into Unified Vulnerability Management (UVM)—a single approach that connects all scanners, adds cloud context, and turns scattered findings into prioritized, fixable risks.

What is Cyber Asset Attack Surface Management (CAASM)?

Cyber asset attack surface management (CAASM) is a security practice that gives teams unified visibility and control over all enterprise assets—cloud, SaaS, on-prem, and beyond. It helps eliminate blind spots and reduce risk by correlating asset data from across your environment and tools. CAASM enables teams to query, prioritize, and act from a single source of truth.

脆弱性スキャン (Vulnerability Scanning)

Wiz エキスパートチーム

脆弱性スキャンは、ITシステム、ネットワーク、およびソフトウェアのセキュリティ上の欠陥を検出して評価するプロセスです。

What is Attack Surface Analysis?

Wiz エキスパートチーム

Attack surface analysis is a cybersecurity practice that identifies and evaluates all potential access points, external and internal, that an attacker could exploit.

On-Premise vs. Cloud Security

Wiz エキスパートチーム

Let's compare on-premises and cloud security, examine their differences, and explore key cloud-specific security concepts to help you choose the best approaches to security for your entire organization.

Top CIEM Solutions: Which Should You Try?

Wiz エキスパートチーム

Smart CIEM beats basic visibility. The best platforms prioritize real attack paths and provide actionable fixes, not just permission inventories.

ABAC vs. RBAC: What’s the difference?

Wiz エキスパートチーム

Choosing between role-based access control (RBAC) and attribute-based access control (ABAC) sets up how your cloud stack determines who may do what, where, and when. This blog post shows you the functional differences between the two models.

What is Code-to-Cloud Security?

Wiz エキスパートチーム

Code-to-cloud security protects applications across the entire software development lifecycle (SDLC), from code all the way to runtime in the cloud.

What is a VPC?

Wiz エキスパートチーム

A VPC is a logically isolated private network within a public cloud that users can fully configure.