CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

Essential Azure Security Best Practices

Wiz Experts Team

Between its reliability and its robust scalability, Azure has become an integral part of many organizations' cloud architecture. Learn how to secure your Azure deployment with these 5 essential best practices.

CNAPP vs. CDR: What's the Difference?

Wiz Experts Team

While CDR and CNAPP are often discussed as separate approaches, CDR capabilities should be viewed as essential components within a comprehensive CNAPP strategy, not as competing alternatives.

Data Categorization: Types, strategies, and steps

Wiz Experts Team

In this article, we'll explore the different types of data categorization, strategies for effective management, and how to avoid common pitfalls that can complicate cloud data governance.

What is Cloud Configuration Management?

Wiz Experts Team

Cloud configuration management is the process of defining, enforcing, and maintaining consistent cloud resource configurations across environments. This includes automating deployment, monitoring compliance, preventing misconfigurations, and ensuring security, cost efficiency, and operational reliability.

Introduction to the NIST Cybersecurity Framework (CSF)

Wiz Experts Team

The NIST Cybersecurity Framework (CSF) is a risk-based framework designed to help organizations manage and reduce cybersecurity risks. It provides a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats.

Dissecting Cloud Attacks and Attack Vectors

Wiz Experts Team

Cloud attacks are malicious activities that target cloud data and infrastructure. By exploiting cloud vulnerabilities, attackers try to access and tamper with cloud data by exfiltrating sensitive information or disrupting operations.

What is CTEM (Continuous Threat Exposure Management)?

Continuous Threat Exposure Management (CTEM) has emerged as a proactive approach to cybersecurity, enabling security teams to identify, assess, and mitigate threats—in real-time, which is key. However, despite its growing popularity, there are still many questions surrounding CTEM. In this blog post, we'll delve into the top seven questions that cybersecurity practitioners often ask about CTEM—see if you’ve been looking for answers to these yourself!

Unified Vulnerability Management (UVM) Explained

Unified Vulnerability Management (UVM) has undergone a significant evolution in recent years, driven by technological advancements, changing threat landscapes, and increased regulatory demands. In this post, we explore how UVM has evolved and where we believe it’s headed in the next few years.

NIST 800-171: A Fast Track Guide

Wiz Experts Team

In this article, we’ll explore the ins and outs of NIST 800-171 compliance, including how it fits within the broader NIST standards and who needs to comply. We’ll also discuss some cloud security best practices to help you keep data safe.