CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

What is an Attack Surface?

Wiz Experts Team

An attack surface is refers to all the potential entry points an attacker could exploit to gain unauthorized access to a system, network, or data.

The role of Kubernetes in AI/ML development

In this blog post, you’ll discover how Kubernetes plays a crucial role in AI/ML development. We’ll explore containerization’s benefits, practical use cases, and day-to-day challenges, as well as how Kubernetes security can protect your data and models while mitigating potential risks.

Static Code Analysis

Static code analysis identifies security vulnerabilities and coding issues without executing the code, improving software quality and security.

What is Identity Threat Detection and Response (ITDR)?

Identity threat detection and response (ITDR) is a cybersecurity approach that uses a combination of tools, intelligence, and automation to proactively detect, investigate, and respond to threats targeting digital identities and authentication systems in the cloud.

Generative AI Security: Risks & Best Practices

Wiz Experts Team

Generative AI (GenAI) security is an area of enterprise cybersecurity that zeroes in on the risks and threats posed by GenAI applications. To reduce your GenAI attack surface, you need a mix of technical controls, policies, teams, and AI security tools.

AI/ML in Kubernetes Best Practices: The Essentials

Our goal with this article is to share the best practices for running complex AI tasks on Kubernetes. We'll talk about scaling, scheduling, security, resource management, and other elements that matter to seasoned platform engineers and folks just stepping into machine learning in Kubernetes.

What is Cloud Configuration Management?

Wiz Experts Team

Cloud configuration management is the process of defining, enforcing, and maintaining consistent cloud resource configurations across environments. This includes automating deployment, monitoring compliance, preventing misconfigurations, and ensuring security, cost efficiency, and operational reliability.

A Comprehensive Guide to Navigating FISMA Compliance

Wiz Experts Team

FISMA compliance is the set of processes, controls, and protocols an organization must have in place to ensure its information assets satisfy the requirements of the Federal Information Security Management Act (FISMA).

Introduction to the NIST Cybersecurity Framework (CSF)

Wiz Experts Team

The NIST Cybersecurity Framework (CSF) is a risk-based framework designed to help organizations manage and reduce cybersecurity risks. It provides a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats.

What is Application Security testing?

Application security testing (AST) is a set of processes designed to detect and address security gaps during the early phases of the software development lifecycle (SDLC). In other words, teams take steps in pre-production to identify and mitigate risks before applications are released into operational environments.