#Security
Wiz Data Foundations: Where’s My Sensitive Data—And Who Can Access It?
A hands-on walkthrough of how to use Wiz to find sensitive data and uncover who can access it.
Research Briefing: MCP Security
The present and future of security for the Model Context Protocol.
Top security talks from KubeCon Europe 2025
Many of the talks at KubeCon Europe, Europe’s largest open source community conference, were related to security. Let's discuss some of our favorites.
Crying out Cloud: Our Favorite Stories of 2024
Check out our top podcast episode picks from the past year.
CPU_HU: Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims
Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.
How to use the new CloudTrail network activity events for AWS VPC Endpoints
Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
Securing Cloud Databases: Best Practices with ClickHouse and Wiz
How to protect sensitive data in cloud-hosted databases with built-in security controls, best practices, and continuous risk monitoring.
新たなGitHub Actionのサプライチェーン攻撃: reviewdog/action-setup
tj-actions/changed-files に対するサプライチェーン攻撃により、多くのリポジトリが週末に機密情報を漏えいしました。Wiz Research は、reviewdog/actions-setup@v1 に対する追加のサプライチェーン攻撃を発見しており、これが tj-actions/changed-files の侵害に寄与した可能性があります。
Key Takeaways from the 2025 State of AI in the Cloud Report
From DeepSeek adoption to impact on security and governance.
Emily Heath’s 5 Key Questions CISOs Should Ask Before Board Meetings
Experts share a powerful framework and strategies for effective board meeting preparation and communication.
Dev and Sec: The Perfect Pair <3
Discover how this dynamic duo creates secure, agile environments – and how you can foster their romance in your organization.