Academia CloudSec

Bem-vindo à CloudSec Academy, seu guia para navegar pela sopa de letrinhas dos acrônimos de segurança em nuvem e jargão do setor. Livre-se das distrações com conteúdo claro, conciso e habilmente elaborado, cobrindo os fundamentos para as melhores práticas.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

CIEM vs. IAM

Equipe de especialistas do Wiz

Neste artigo, compararemos o CIEM e o IAM para explicar como essas técnicas cruciais ajudam a reduzir sua superfície de ataque.

What is a Reverse Shell Attack?

Equipe de especialistas do Wiz

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

Assista à demonstração de 12 minutos

Veja como a Wiz transforma a visibilidade instantânea em uma remediação rápida.

Para obter informações sobre como a Wiz lida com seus dados pessoais, consulte nosso Política de Privacidade.

Wiz starWiz starWiz starWiz star

What is application penetration testing?

Equipe de especialistas do Wiz

Application penetration testing is a simulated cyberattack against a software application designed to identify exploitable security vulnerabilities before malicious actors do.

Kubernetes Ingress: Controllers, routing, and security

Equipe de especialistas do Wiz

Kubernetes Ingress is an API object that routes external HTTP/HTTPS traffic to multiple backend services, typically behind a shared external entry point, by mapping the HTTP Host header and URL path to specific internal services.

Kubernetes Vulnerability Scanning

Kubernetes vulnerability scanning is the systematic process of inspecting a Kubernetes cluster (including its container images and configurations) to detect security misconfigurations or vulnerabilities that could compromise the security posture of the cluster.

Guide to Standard SBOM Formats

Equipe de especialistas do Wiz

Two major formats dominate the SBOM ecosystem: Software Package Data Exchange (SPDX) and CycloneDX (CDX). Let’s review!

The AI Cybersecurity Company Landscape

Equipe de especialistas do Wiz

The right AI cybersecurity software for you depends on your real-world needs: posture management, noise reduction, automation, and unification with your existing cloud stack.