CloudSec 아카데미

클라우드 보안 약어와 업계 전문 용어의 알파벳 수프를 탐색하는 데 도움이 되는 CloudSec Academy에 오신 것을 환영합니다. 기본 사항부터 모범 사례까지 다루는 명확하고 간결하며 전문적으로 제작된 콘텐츠로 소음을 차단하세요.

Attack surface discovery: From blind spots to visibility

위즈 전문가 팀

Attack surface discovery (ASD) is the continuous, automated process of identifying and mapping every asset, connection, and service an attacker could target across your entire digital footprint (cloud, hybrid, and on-premises environments).

Runtime container scanning best practices

위즈 전문가 팀

Runtime scanning answers a critical question: 'What is runtime security for containers?' It focuses on detecting live behaviors, active threats, and anomalies that only appear when containers execute under real production traffic.

Source code scanning best practices for cloud security

위즈 전문가 팀

Source code scanning is automated analysis of your code, dependencies, and infrastructure definitions to find security issues before you deploy. This means a tool reads your code the way a careful reviewer would, but at high speed and at scale.

How to implement CI/CD security scanning: Best practices

위즈 전문가 팀

CI/CD security scanning is the practice of adding automated security checks into your build and deployment pipelines. This means every meaningful code change is tested for risk before it can reach production.

Wiz의 작동 모습 보기

Wiz는 코드에서 런타임에 이르기까지 클라우드 전반의 점을 연결합니다.

Wiz가 귀하의 개인 데이터를 처리하는 방법에 대한 자세한 내용은 다음을 참조하십시오. 개인정보처리방침.

Wiz wand

What is external vulnerability scanning?

위즈 전문가 팀

External vulnerability scanning is a way to find weaknesses in your public-facing systems by testing them from outside your network. This means you see your environment the same way an attacker on the internet would see it.

Attack surfaces vs. attack vectors: What security teams need to know

위즈 전문가 팀

This blog post will explain strategies for attack surface management (ASM) that integrate both attack surface reduction and attack vector defense into one continuous process, helping you meet the requirements of leading security frameworks like Gartner’s Continuous Threat Exposure Management (CTEM) framework.

무엇인가요 Prompt Injection?

프롬프트 주입 공격은 공격자가 자연어 처리(NLP) 시스템에서 입력 프롬프트를 조작하여 시스템의 출력에 영향을 미치는 AI 보안 위협입니다.

What is continuous vulnerability scanning?

위즈 전문가 팀

Continuous vulnerability scanning is an automated process that checks systems, networks, and applications for security weaknesses to detect new issues promptly.

Best code analysis tools in 2025

위즈 전문가 팀

This post will explore the top 10 code security platforms to see just how well they secure modern cloud-native applications.

What is a vulnerability scanning report?

위즈 전문가 팀

A vulnerability scanning report is a document from a vulnerability scanner that lists discovered weaknesses, shows how severe they are, and explains how to fix them.