Detection and Response

Understand how cloud threats are detected, investigated, and contained. These articles walk through telemetry sources, attack patterns, and practical workflows for fast, effective response.

Top OSS Incident Response Tools

Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.

Security logs

Cloud security logs are formatted text records that capture events and activities as they occur in a cloud environment, providing insight into what’s happening within that environment in real time.

Watch 12-min demo

Watch how Wiz turns instant visibility into rapid remediation.

For information about how Wiz handles your personal data, please see our Privacy Policy.

Wiz starWiz starWiz starWiz star

What is Managed Detection and Response (MDR)?

In this post, we’ll look at some of the differences between MDR and traditional managed services, how MDR functions within organizations, some of the tools it works with for even more effective threat detection and response, and the most important tip for getting the most out of your MDR solution.

Cloud Threat Hunting Explained

Cloud threat hunting is the proactive search for malicious activity across cloud infrastructure, workloads, and identities before automated tools detect it.

Threat Detection and Response (TDR) Explained

Threat detection and response (TDR) is a cybersecurity discipline that combines continuous monitoring, threat identification, investigation, and containment to find and stop attacks before they cause damage.

What is Detection Engineering?

Detection engineering is the practice of systematically designing, building, testing, deploying, and maintaining threat detection logic to identify malicious activity or unauthorized behavior across an organization's environment.

What is a Reverse Shell Attack?

Wiz Experts Team

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

NIST Incident Response: Phases, Benefits, and Tools

Wiz Experts Team

NIST incident response is a structured framework for detecting, containing, and recovering from cyber threats. Learn how SP 800-61 Rev. 3 provides a repeatable process for security teams.

10 Open-Source SOC tools

Wiz Experts Team

Cloud security operations center (SOC) tools are the security solutions used by SOC teams to track and triage threats and vulnerabilities in cloud environments.

What is SecOps? Security Operations Explained

Wiz Experts Team

SecOps is the collaborative integration of IT security and operations teams to protect and manage an organization's digital assets more efficiently.

DoS vs DDoS: What's the difference?

Wiz Experts Team

A Denial of Service (DoS) attack usually originates from one system or one upstream source, while a Distributed Denial of Service (DDoS) attack coordinates many systems (a botnet) to generate traffic volumes that single-source attacks cannot achieve.

What is threat modeling? A practical guide

Wiz Experts Team

Threat modeling is a structured, proactive approach to identifying potential security threats in a system by analyzing it from an attacker's perspective before vulnerabilities can be exploited.

What is Lateral Movement? Understanding Attacker Techniques

Wiz Experts Team

Lateral movement is the set of techniques attackers use to navigate through a network after gaining initial access. Once inside, they pivot from system to system searching for valuable data, privileged accounts, and critical assets.

Cloud Investigation and Response Automation (CIRA)

Cloud investigation and response automation (CIRA) harnesses the power of advanced analytics, artificial intelligence (AI), and automation to provide organizations with real-time insights into potential security incidents within their cloud environments

What is incident response? Process, practices, and automation

Wiz Experts Team

Incident response is a strategic, coordinated process. It is how teams detect, analyze, contain, and recover from security incidents by combining preparation, detection, response protocols, and continuous improvement.

What is a Honeypot in Cloud Security?

Wiz Experts Team

A honeypot is an intentionally vulnerable system that appears legitimate to attract malicious actors. By tricking attackers into interacting with a fake target, security teams can capture valuable intelligence about attacker tools, methods, and motivations in a controlled environment.

How to Prevent DDoS Attacks: Best Practices

Wiz Experts Team

DDoS prevention in cloud environments requires validating that traffic actually routes through protection layers, since direct origin exposure is one of the most common bypass techniques attackers use to circumvent your defenses entirely

SIEM vs SOAR: What is the real difference?

Wiz Experts Team

The main difference is that SIEM focuses on detection and visibility, while SOAR focuses on response and automation. SIEM collects and analyzes vast amounts of log data, whereas SOAR acts on processed alerts and findings.

What is a Man-in-the-Middle (MiTM) Attack?

Wiz Experts Team

A man-in-the-middle attack is a cyberattack where an attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other.

What does a SOC analyst in cloud security do?

Wiz Experts Team

SOC analysts translate cloud telemetry into actionable decisions by interpreting identity activity, workload behavior, and infrastructure changes in context.

What Is Cloud Incident Response?

Cloud incident response is a strategic approach to detecting and recovering from cyberattacks on cloud-based systems with the goal of minimizing the impact to your workloads and business operation accordingly.

How to Make Your Incident Response Framework Actionable

Wiz Experts Team

An incident response framework is a blueprint that helps organizations deal with security incidents in a structured and efficient way. It outlines the steps to take before, during, and after an incident, and assigns roles and responsibilities to different team members.

What is Managed Threat Hunting?

Wiz Experts Team

Managed threat hunting is a proactive security service where experts search for hidden threats automated tools miss, reducing dwell time and potential damage.

What is SOC threat hunting?

Wiz Experts Team

SOC threat hunting is a proactive cybersecurity practice where analysts actively search for signs of malicious activity that bypass traditional security controls.

DevSecOps vs DevOps: Key differences & Comparison

Wiz Experts Team

DevOps is a way of working that breaks down walls between development and operations teams. This means developers and IT operations work together instead of in separate silos, which helps companies build and release software faster.

Threat hunting vs threat intelligence: Key differences

Wiz Experts Team

Threat hunting actively searches for hidden threats already inside your network, while threat intelligence gathers external information about potential threats to inform security strategy.

Incident response plan testing for cloud security

Wiz Experts Team

Incident response plan testing is essential for cloud-native organizations because it goes far beyond checking a box—it’s about proving your team’s ability to handle the unpredictable nature of real attacks.

Top Incident Response Certifications for Aspiring Responders

Wiz Experts Team

Incident response certifications are professional credentials that prove you can handle security breaches when they happen. These certifications show employers that you know how to detect threats, contain damage, and get systems back to normal after an attack.

MDR vs. SOC: What's the difference?

Wiz Experts Team

A SOC manages cloud and on-premises security with complete oversight. On the other hand, MDR is an external service that provides cloud-focused threat detection and response, offloads operational complexity, and offers flexibility without internal resource expansion.

What is Alert Fatigue in Cybersecurity?

Alert fatigue, sometimes known as alarm fatigue, happens when security team members are desensitized by too many notifications, leading them to miss critical signals and legitimate warnings.

Malware Detection: Tools and Techniques

Wiz Experts Team

To defend against malware in the cloud, businesses need a detection and response solution that’s built for the cloud, fluent in cloud-based indicators of compromise (IOCs), and enriched by cloud threat intelligence.

What is SOCaaS?

Wiz Experts Team

SOCaaS outsources threat detection, investigation, and response for cost savings, scalable operations, and on-demand expertise.

Social Engineering Attacks: Types + Examples

Wiz Experts Team

Social engineering is an attack technique that focuses on exploiting an enterprise’s employees. In a typical social engineering scenario, cybercriminals may trick or deceive employees into ignoring security protocols, making them unwitting collaborators in cyberattacks.

What is Anomaly Detection?

In this post, we’ll look at where anomaly detection fits into your cybersecurity big picture, some common techniques and use cases, as well as some tips on rolling out anomaly detection without adding to your teams’ workload.

NOC vs. SOC

Wiz Experts Team

In this post, we’ll explore similarities and differences between the NOC and SOC. Then we’ll take a look at some tools that help NOCs and SOCs accomplish their core functions—as well as some tips for overcoming the main challenges to their smooth operation within your organization.

MTTD and MTTR in Cybersecurity Incident Response

Most incident response teams measure both MTTD and MTTR to not only shorten attackers’ dwell times in their systems but also to gauge the team’s readiness to combat future security incidents and then optimize response times.

What is Cloud Threat Modeling?

Cloud threat modeling is a systematic approach designed to uncover, evaluate, and rank the potential security vulnerabilities and dangers unique to cloud-based systems and infrastructure.

The SOC Team Roster: Roles & responsibilities

Wiz Experts Team

A security operations center (SOC) team is a group of highly skilled professionals responsible for scanning IT environments and identifying and remediating cybersecurity threats and incidents

What is Cloud Forensics?

Cloud forensics is a branch of digital forensics that applies investigative techniques to collecting and evaluating critical evidence in cloud computing environments following a security incident.

What is Credential Access (TA0006)?

Wiz Experts Team

Credential access is a cyberattack technique where threat actors access and hijack legitimate user credentials to gain entry into an enterprise's IT environments.