CloudSec Academy

CloudSec Academy へようこそ。クラウドセキュリティの頭字語と業界用語のアルファベットスープをナビゲートするためのガイドです。 明確で簡潔、かつ専門的に作成されたコンテンツで、基本的なことからベストプラクティスまでをカバーします。

How to Evaluate Wiz: Common FAQs

Wiz エキスパートチーム

This FAQ is designed to help teams evaluate whether Wiz is the right cloud security solution for them by answering the most common technical, strategic, and logistical questions.

Attack surface discovery: From blind spots to visibility

Wiz エキスパートチーム

Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).

Runtime container scanning best practices

Wiz エキスパートチーム

Runtime scanning answers a critical question: 'What is runtime security for containers?' It focuses on detecting live behaviors, active threats, and anomalies that only appear when containers execute under real production traffic.

Wiz の実際の動作を見る

Wiz は、コードからランタイムまで、クラウド全体の点と点をつなぎます。

Wiz がお客様の個人データをどのように取り扱うかについては、当社のプライバシーポリシーをご確認下さい: プライバシーポリシー.

Wiz wand

Source code scanning best practices for cloud security

Wiz エキスパートチーム

Source code scanning is automated analysis of your code, dependencies, and infrastructure definitions to find security issues before you deploy. This means a tool reads your code the way a careful reviewer would, but at high speed and at scale.

How to implement CI/CD security scanning: Best practices

Wiz エキスパートチーム

CI/CD security scanning is the practice of adding automated security checks into your build and deployment pipelines. This means every meaningful code change is tested for risk before it can reach production.

What is external vulnerability scanning?

Wiz エキスパートチーム

External vulnerability scanning is a way to find weaknesses in your public-facing systems by testing them from outside your network. This means you see your environment the same way an attacker on the internet would see it.

Attack surfaces vs. attack vectors: What security teams need to know

Wiz エキスパートチーム

This blog post will explain strategies for attack surface management (ASM) that integrate both attack surface reduction and attack vector defense into one continuous process, helping you meet the requirements of leading security frameworks like Gartner’s Continuous Threat Exposure Management (CTEM) framework.

What is continuous vulnerability scanning?

Wiz エキスパートチーム

Continuous vulnerability scanning is an automated process that checks systems, networks, and applications for security weaknesses to detect new issues promptly.

Best code analysis tools in 2025

Wiz エキスパートチーム

This post will explore the top 10 code security platforms to see just how well they secure modern cloud-native applications.

What is a vulnerability scanning report?

Wiz エキスパートチーム

A vulnerability scanning report is a document from a vulnerability scanner that lists discovered weaknesses, shows how severe they are, and explains how to fix them.