Vulnerability Management

Understand how organizations reduce risk at scale. These articles cover scanning approaches, common weaknesses, and how teams prioritize and remediate vulnerabilities across the cloud.

What is dependency scanning in cloud security?

Equipe de especialistas do Wiz

Dependency scanning is the automated analysis of the third-party libraries, frameworks, and packages that developers use to build applications.

What is cloud vulnerability scanning? Modern best practices

Equipe de especialistas do Wiz

Cloud vulnerability scanning is the automated process of identifying security flaws within your cloud infrastructure, workloads, and configurations. Unlike traditional scanning designed for static, on-premises servers, cloud scanning is built to handle the dynamic nature of the cloud.

What is CVE scanning?

Equipe de especialistas do Wiz

CVE scanning is the automated process of checking your software, systems, and networks against a database of known security flaws to identify vulnerabilities before attackers can exploit them.

What is internal vulnerability scanning?

Equipe de especialistas do Wiz

Internal vulnerability scanning is the process of identifying security weaknesses within an organization’s internal network infrastructure.

What is external vulnerability scanning?

Equipe de especialistas do Wiz

External vulnerability scanning is a way to find weaknesses in your public-facing systems by testing them from outside your network. This means you see your environment the same way an attacker on the internet would see it.

What is continuous vulnerability scanning?

Equipe de especialistas do Wiz

Continuous vulnerability scanning is an automated process that checks systems, networks, and applications for security weaknesses to detect new issues promptly.

What is a vulnerability scanning report?

Equipe de especialistas do Wiz

A vulnerability scanning report is a document from a vulnerability scanner that lists discovered weaknesses, shows how severe they are, and explains how to fix them.

Vulnerability Management: The Complete Guide

Equipe de especialistas do Wiz

Learn about vulnerability management and how you can improve your cloud security with best practices and tools—plus how you can get a 1-on-1 assessment.

What is application vulnerability management?

Equipe de especialistas do Wiz

Application vulnerability management is a continuous process of discovering, assessing, prioritizing, and remediating security weaknesses in your software code, APIs, and dependencies across the entire development lifecycle.

Top Vulnerability Management Solutions in 2026

Equipe de especialistas do Wiz

Modern vulnerability management is evolving into Unified Vulnerability Management (UVM)—a single approach that connects all scanners, adds cloud context, and turns scattered findings into prioritized, fixable risks.

What is Continuous Vulnerability Management?

Equipe de especialistas do Wiz

Continuous vulnerability management (CVM) is a non-stop, iterative cycle that involves finding, prioritizing, and fixing vulnerabilities.

Unified Vulnerability Management (UVM) Explained

Unified Vulnerability Management (UVM) has undergone a significant evolution in recent years, driven by technological advancements, changing threat landscapes, and increased regulatory demands. In this post, we explore how UVM has evolved and where we believe it’s headed in the next few years.

Top OSS Vulnerability Scanners [By Category]

Equipe de especialistas do Wiz

Vulnerability scanning is an integral component of every vulnerability management program, providing security teams with insights needed to address vulnerabilities before they become attack vectors. When conducted regularly, vulnerability assessments offer asset discovery and visibility, attack surface management, and compliance enforcement.