Shaked Rotlevi

Shaked is a Technical Product Marketing Manager (PMM) focused on Wiz's core capabilities, including CSPM, CIEM, and Vulnerability Management which help organizations establish a secure foundation in the cloud. Previously, she's been part of Public Sector Solutions Architecture team at AWS as well as a Technical Program Manager on the AWS Config team. Outside work, Shaked loves playing volleyball, surfing and anything outdoors.

Shaked Rotlevi 기사

13 Essential Data Security Best Practices in the Cloud

Cloud data security is the practice of safeguarding sensitive data, intellectual property, and secrets from unauthorized access, tampering, and data breaches. It involves implementing security policies, applying controls, and adopting technologies to secure all data in cloud environments.

What is Data Risk Management?

Data risk management involves detecting, assessing, and remediating critical risks associated with data. We're talking about risks like exposure, misconfigurations, leakage, and a general lack of visibility.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

What is Data Flow Mapping?

In this article, we’ll take a closer look at everything you need to know about data flow mapping: its huge benefits, how to create one, and best practices, and we’ll also provide sample templates using real-life examples.

Data Security Compliance Explained

Data security compliance is a critical aspect of data governance that involves adhering to the security-centric rules and regulations set forth by supervisory and regulatory bodies, including federal agencies.

Data Leakage: 위험, 원인 및 예방

데이터 유출은 조직 데이터를 제3자에게 무단으로 반출하는 것입니다. 잘못 구성된 데이터베이스, 제대로 보호되지 않은 네트워크 서버, 피싱 공격 또는 부주의한 데이터 처리와 같은 다양한 수단을 통해 발생합니다.

Vulnerability Prioritization in the Cloud: Strategies + Steps

Vulnerability prioritization is the practice of assessing and ranking identified security vulnerabilities based on critical factors such as severity, potential impact, exploitability, and business context. This ranking helps security experts and executives avoid alert fatigue to focus remediation efforts on the most critical vulnerabilities.

AI Risk Management: Essential AI SecOps Guide

AI risk management is a set of tools and practices for assessing and securing artificial intelligence environments. Because of the non-deterministic, fast-evolving, and deep-tech nature of AI, effective AI risk management and SecOps requires more than just reactive measures.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

무엇인가요 Prompt Injection?

프롬프트 주입 공격은 공격자가 자연어 처리(NLP) 시스템에서 입력 프롬프트를 조작하여 시스템의 출력에 영향을 미치는 AI 보안 위협입니다.

CSPM이란 무엇입니까?

CSPM(Cloud Security Posture Management)은 클라우드 환경 및 서비스(예: 공용 읽기 액세스 권한이 있는 S3 버킷)에서 위험을 지속적으로 감지하고 수정하는 프로세스를 설명합니다. CSPM 도구는 업계 모범 사례, 규정 요구 사항 및 보안 정책에 따라 클라우드 구성을 자동으로 평가하여 클라우드 환경이 안전하고 적절하게 관리되도록 합니다.

AI 보안 도구: 오픈 소스 툴킷

MLSecOps의 5가지 기본 영역을 검토하고, 조직에서 MLSecOps의 중요성이 커지고 있음을 살펴보고, 확인할 수 있는 6가지 흥미로운 오픈 소스 도구를 소개하여 MLSecOps 도구 환경에 대해 자세히 살펴보겠습니다

Cloud compliance가 무엇인가요?

클라우드 규정 준수는 클라우드 기반 자산이 조직과 관련된 데이터 보호 규정, 표준 및 프레임워크의 요구 사항을 충족하도록 하기 위해 마련해야 하는 일련의 절차, 제어 및 조직적 조치입니다.

Shaked Rotlevi 게시물

Wiz at Re:Invent 2023

See what’s new with Wiz at Re:Invent 2023 and learn about how Wiz and AWS continue to strengthen their strategic partnership, keeping AWS customers’ environments secure.

Wiz at Re:Inforce 2023

See what is new with Wiz at Re:Inforce and learn about how Wiz and AWS continue to strengthen a strategic relationship to secure customers’ AWS environments.