What Analyzing Hundreds of Thousands of Cloud Environments Taught Us About Data Exposure
Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.
Wiz Research reveals the latest cloud data security trends across hundreds of thousands of real-world environments.
Wiz is excited to announce our “Deployed on AWS” status with AWS Marketplace demonstrating our deep partnership with AWS and supporting our customer’s buying decisions
Wiz is excited to announce “The Cloud Hunting Games”, a new hands-on Capture the Flag (CTF) challenge designed to test your cloud incident response skills.
Build resilient GitHub Actions workflows with lessons from recent attacks.
Wiz is excited to bring Data Security Posture Management (DSPM) into our FedRAMP authorized offering. DSPM enables organizations requiring FedRAMP to automate classification, policy enforcement, and continuous monitoring for their sensitive cloud data.
A hands-on walkthrough of how to use Wiz to find sensitive data and uncover who can access it.
Unified model context, real-time security answers, and a faster path to remediation.
The present and future of security for the Model Context Protocol.
Learn how to secure your cloud identities and operationalize Zero Standing Privileges with the Wiz and CyberArk integration
Wiz partnered with the Institute for Critical Infrastructure Technology (ICIT) publishing a report around findings from a survey given to federal and state agencies, highlighting the growing importance of cloud and AI technologies, and concerns around available resources and data protections.
Many of the talks at KubeCon Europe, Europe’s largest open source community conference, were related to security. Let's discuss some of our favorites.
Check out our top podcast episode picks from the past year.
Accelerate your cloud SecOps transformation.
Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.
Over 40% of cloud environments are vulnerable to RCE, likely leading to a complete cluster takeover.
Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
How to protect sensitive data in cloud-hosted databases with built-in security controls, best practices, and continuous risk monitoring.
A supply chain attack on tj-actions/changed-files caused many repositories to leak their secrets over the weekend. Wiz Research has discovered an additional supply chain attack on reviewdog/actions-setup@v1, that may have contributed to the compromise of tj-actions/changed-files.
A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk.
From DeepSeek adoption to impact on security and governance.
Wiz enhances Slack integration to streamline risk investigation and response and bring security knowledge directly to Slack
Experts share a powerful framework and strategies for effective board meeting preparation and communication.
Wiz was named the leader in the Winter 2025 CDR Grid Report, based on independent customer reviews.