Academia CloudSec

Bem-vindo à CloudSec Academy, seu guia para navegar pela sopa de letrinhas dos acrônimos de segurança em nuvem e jargão do setor. Livre-se das distrações com conteúdo claro, conciso e habilmente elaborado, cobrindo os fundamentos para as melhores práticas.

9 Best Practices for Stronger Azure Security

Equipe de especialistas do Wiz

Misconfigurations, weak access controls, and data exposure put your Azure workloads at risk. Follow these 9 proven security best practices to stay protected.

Azure Security Risks & Mitigation Steps

Equipe de especialistas do Wiz

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

What are Application Security Frameworks?

Equipe de especialistas do Wiz

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

Veja o Wiz em ação

O Wiz conecta os pontos em toda a sua nuvem, do código ao tempo de execução.

Para obter informações sobre como a Wiz lida com seus dados pessoais, consulte nosso Política de Privacidade.

Wiz wand

What is a denial of service attack? Types and prevention

Equipe de especialistas do Wiz

A denial of service (DoS) attack makes an application, service, or network resource unavailable to legitimate users by overwhelming systems with traffic, requests, or state transitions.

What is zero trust architecture? A complete guide for cloud security

Equipe de especialistas do Wiz

Enterprises have started gradually shifting from perimeter-based defenses to more proactive and identity-centric protection. Zero trust architecture eliminates implicit trust assumptions by requiring continuous verification of every user, device, and transaction.

What is SBOM scanning?

Equipe de especialistas do Wiz

An SBOM contains an inventory of all software components, libraries, dependencies, versions, licenses, and relationships.

What is Docker vulnerability scanning?

Equipe de especialistas do Wiz

Docker vulnerability scanning is the automated process of analyzing container images to find known security weaknesses.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

CSPM in AWS

Equipe de especialistas do Wiz

In this article, we’ll discuss typical cloud security pitfalls and how AWS uses CSPM solutions to tackle these complexities and challenges, from real-time compliance tracking to detailed risk assessment.

SAST vs. SCA: What's the Difference?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

What is AWS vulnerability scanning?

Equipe de especialistas do Wiz

AWS vulnerability scanning identifies security flaws across EC2 instances (including secrets mistakenly stored in user data), containers, Lambda functions, and other compute resources.