CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

AI Threat Detection Explained

AI threat detection uses advanced analytics and AI methodologies such as deep learning (DL) and natural language processing (NLP) to assess system behavior, identify abnormalities and potential attack paths, and prioritize threats in real time.

What is Identity Threat Detection and Response (ITDR)?

Identity threat detection and response (ITDR) is a cybersecurity approach that uses a combination of tools, intelligence, and automation to proactively detect, investigate, and respond to threats targeting digital identities and authentication systems in the cloud.

Social Engineering Attacks: Types + Examples

Wiz Experts Team

Social engineering is an attack technique that focuses on exploiting an enterprise’s employees. In a typical social engineering scenario, cybercriminals may trick or deceive employees into ignoring security protocols, making them unwitting collaborators in cyberattacks.

What is Anomaly Detection?

In this post, we’ll look at where anomaly detection fits into your cybersecurity big picture, some common techniques and use cases, as well as some tips on rolling out anomaly detection without adding to your teams’ workload.

What is Managed Detection and Response (MDR)?

In this post, we’ll look at some of the differences between MDR and traditional managed services, how MDR functions within organizations, some of the tools it works with for even more effective threat detection and response, and the most important tip for getting the most out of your MDR solution.

What is Threat Intelligence?

Wiz Experts Team

Threat intelligence, also called cyber threat intelligence (CTI), is the practice of gathering and analyzing trends about potential or ongoing cyber threats.

What is Detection Engineering?

Detection engineering is a structured approach to developing, implementing, and refining threat detection mechanisms that’s tailored to an organization’s specific environment.

NOC vs. SOC

Wiz Experts Team

In this post, we’ll explore similarities and differences between the NOC and SOC. Then we’ll take a look at some tools that help NOCs and SOCs accomplish their core functions—as well as some tips for overcoming the main challenges to their smooth operation within your organization.

10 Open-Source SOC tools

Wiz Experts Team

Cloud security operations center (SOC) tools are the security solutions used by SOC teams to track and triage threats and vulnerabilities in cloud environments.

What is Data Detection and Response?

Data detection and response (DDR) is a cybersecurity solution that uses real-time data monitoring, analysis, and automated response to protect sensitive data from sophisticated attacks that traditional security measures might miss, such as insider threats, advanced persistent threats (APTs), and supply chain attacks.

Top OSS Incident Response Tools

Open-source software (OSS) incident response (IR) tools are publicly available tools enterprises use to effectively manage and respond to numerous security threats.

Top 9 OSINT tools

Wiz Experts Team

Open-source intelligence (OSINT) is a framework that involves gathering, analyzing, and interpreting publicly available data to gain insights into cyber threats, adversarial activities, and attack techniques. OSINT identifies innocuous-seeming information that, if analyzed with an attacker’s mindset, could reveal critical loopholes in an enterprise’s security posture.