Academia CloudSec
Bem-vindo à CloudSec Academy, seu guia para navegar pela sopa de letrinhas dos acrônimos de segurança em nuvem e jargão do setor. Livre-se das distrações com conteúdo claro, conciso e habilmente elaborado, cobrindo os fundamentos para as melhores práticas.
Veja o Wiz em ação
Veja como a Wiz transforma fundamentos de segurança em nuvem em resultados reais.
How to secure the SDLC with Wiz
Learn how to secure the SDLC from code to runtime with DevSecOps best practices: SAST, SCA, IaC scanning, CI/CD hardening, CSPM, CDR, and compliance mapping.
GraphQL API security risks every developer should know about
GraphQL API security is a set of specialized practices and controls for protecting GraphQL endpoints.
Unmanaged API security: What cloud teams need to know
Unmanaged APIs are undocumented interfaces that operate outside standardized security and governance frameworks.
Veja o Wiz em ação
O Wiz conecta os pontos em toda a sua nuvem, do código ao tempo de execução.
API security posture management explained
API security posture management, or API-SPM, is a security discipline that focuses on maintaining and proactively improving the security health of enterprise APIs.
The Open-Source CNAPP Toolkit
With a CNAPP, your team is empowered to pick and choose solutions that best fit your security capability and cost requirements. This article reviews the best open-source CNAPP tools for 2024.
Cloud engineer job description (template, skills, salary)
A cloud engineer is a technical expert responsible for architecting, implementing, and managing an organization's cloud infrastructure and services. This role involves working across the full cloud lifecycle, from initial planning and design to deployment and ongoing optimization.
10 Cloud engineer interview questions for hiring managers
This list of questions helps you reveal a candidate's technical capability and their security mindset. Use these prompts to uncover whether candidates can apply context by linking code, identities, infrastructure, and data to prioritize what truly matters.
O que é ASPM? [Application Security Posture Management]
O gerenciamento da postura de segurança de aplicativos envolve a avaliação contínua de aplicativos em busca de ameaças, riscos e vulnerabilidades em todo o ciclo de vida de desenvolvimento de software (SDLC).
O que é CSPM?
Cloud Security Posture Management (CSPM) descreve o processo de detecção e correção contínua de riscos em ambientes e serviços de nuvem (por exemplo, buckets S3 com acesso público de leitura). As ferramentas CSPM avaliam automaticamente as configurações de nuvem em relação às melhores práticas do setor, requisitos regulatórios e políticas de segurança para garantir que os ambientes de nuvem sejam seguros e gerenciados adequadamente.
What is a Honeypot in Cloud Security?
A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.
O que é DSPM? [Data Security Posture Management]
O gerenciamento de postura de segurança de dados (DSPM) é uma solução projetada para monitorar continuamente as políticas e procedimentos de segurança de dados de uma organização para detectar vulnerabilidades e riscos potenciais.
Cloud Application Security: Basics and Best Practices
Cloud app security involves ensuring that both cloud-native and cloud-based apps are protected from vulnerabilities through the use of proper tools and practices.
Unpacking Data Security Policies
A data security policy is a document outlining an organization's guidelines, rules, and standards for managing and protecting sensitive data assets.
How to patch container base images: Methods and best practices
Container base image patching is the process of updating the OS and runtime libraries in the base layer of a container image to remediate vulnerabilities and keep images secure.
Verificação de vulnerabilidades (Vulnerability Scanning)
A varredura de vulnerabilidades é o processo de detectar e avaliar falhas de segurança em sistemas, redes e softwares de TI.
Cloud storage costs and secure optimization
Cloud storage cost refers to the total expense associated with storing, accessing, and managing data across cloud platforms like AWS S3, Azure Blob Storage, and Google Cloud Storage.