Greg Zemlin
Greg is a dedicated member of the Wiz Product Marketing team, where he brings his expertise in Cloud Detection and Response. For the better part of the last decade, Greg has contributed to the development of detection and response products, holding key roles in Product Marketing and Product Management. Outside of his professional endeavors, Greg values quality family time with his family and has a passion for CrossFit.
Greg Zemlin の記事
Threat Detection and Response: Improve Your Cloud Security
Learn the foundations of threat detection and response, best practices, and the tools you need to strengthen your cloud security against emerging threats.
MITRE ATTACK Framework: Tactics, Techniques and More
Learn use cases, tactics, and the foundations of the MITRE ATTACK (also known as MITRE ATT&CK) framework and how to leverage it for improved cloud security.
What is Cloud Detection and Response (CDR)?
Learn the foundations of cloud detection and response (CDR), how to implement it, and the right platform to manage your cloud security plan.
What Is Privilege Escalation? Types and Prevention Strategies
Privilege escalation is when an attacker exploits weaknesses in your environment or infrastructure to gain higher access and control within a system or network.
What Is Cryptojacking? How It Works & Tips to Prevent It
Cryptojacking is when an attacker hijacks your processing power to mine cryptocurrency for their own benefit.
What is SOC automation? Why and how to automate your SOC
In this article, we’ll dig into why you should consider automating SOC, which SOC workflows to automate, and some best practices to adopt.
How to Create an Incident Response Policy: An Actionable Checklist and Template
Build a strong incident response policy to manage cybersecurity crises with clear roles, compliance steps, and hands-on training.
The 13 Must-Follow Threat Intel Feeds
A threat intel feed, or threat intelligence feed, provides a continuous incoming flow of data related to cyber threats and risks.
The Top 8 OSS Threat Intelligence Tools
In this blog post, we’ll shine a light on the top OSS threat intelligence platforms and tools that enterprises can integrate into their security stack.
MTTD and MTTR in Cybersecurity Incident Response
Most incident response teams measure both MTTD and MTTR to not only shorten attackers’ dwell times in their systems but also to gauge the team’s readiness to combat future security incidents and then optimize response times.
Attack Path Analysis (APA) Explained
Attack path analysis (APA) is a cybersecurity technique that identifies and maps how potential attackers could infiltrate your network and systems
What is Defense Evasion According to MITRE?
MITRE ATT&CK®, a publicly available security toolkit that helps enterprises overcome cyber threats, defines defense evasion as a way for malicious actors to evade detection during an attack.
Cloud Threat Hunting Explained
Threat hunting involves a systematic, continuous search to find and eliminate malicious activity within an organization’s environment.
Cloud Investigation and Response Automation (CIRA)
Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments
CDR vs EDR vs XDR: What's the difference?
Wade through the alphabet soup of detection and response technologies to understand where they overlap and how they differ.
Agentless vs. Agent-Based Security: Which is Better for the Cloud?
Agentless and agent-based systems are both valid approaches for cloud security. There is no single right answer when deciding which to choose, as each comes with its own advantages and drawbacks.
Greg Zemlin の投稿
Ta Da! The Wiz Runtime Sensor is now available in Wiz for Gov (FedRAMP)
We are excited to announce the addition of the Wiz Sensor to Wiz for Gov’s ATO. The lightweight eBPF based sensor improves risk prioritization, deepens threat detection, and adds runtime protection for container hosts and VMs.
Introducing Hybrid File Integrity Monitoring
Enhance your security with Wiz’s new hybrid File Integrity Monitoring (FIM) solution, combining agentless and runtime capabilities for comprehensive file monitoring.
Custom runtime rules and runtime response policies: new layers of defense
Wiz's custom runtime rules and runtime response policies add new layers to your defense-in-depth strategy.
Expanding coverage with Linux runtime
Wiz announces its Runtime Sensor for Linux, expanding coverage of threat detection and response for cloud workloads.
Defense in depth: XZ Utils
We explore assessment, prevention, and detection strategies for protecting your organization from the XZ Utils vulnerability.