Security Posture Management for GitHub: spotting and fixing risks in your GitHub organization just got a lot easier
Wiz SPM for version control systems helps you find and fix risks in your GitHub instance.
Wiz SPM for version control systems helps you find and fix risks in your GitHub instance.
We’re excited to announce the release of a comprehensive guide to mastering Google Cloud Security.
We provide top takeaways from the NSA's recommended top ten cloud security mitigation strategies.
Wiz presents a comprehensive guide to mastering cloud security at financial services organizations.
Use the Wiz App to consume and analyze data more easily in Splunk via a dedicated dashboard.
Organizations can now improve their mean time to remediate (MTTR) with AI-generated remediation steps.
Secure your applications across the SDLC by deploying only trusted images and monitoring your Kubernetes control plane in near-real time to detect potential threats.
Oracle Cloud Infrastructure customers can now effectively protect their sensitive data with Wiz’s Data Security Posture Management (DSPM) capabilities.
NamespaceHound is an open-source tool for detecting the risk of potential namespace crossing violations and anonymous access opportunities in multi-tenant clusters.
Monitor code for sensitive data to reduce the risk of accidental exposure or compliance violation.
Test your investigation skills and K8s network knowledge in a new CTF event: the K8s LAN Party Challenge!
In a recent webinar hosted by Wiz, three esteemed CISOs shared their strategies for getting C-suite executives on board with plans for a comprehensive security program.
Detect and mitigate CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score: 7.3), authentication bypass vulnerabilities in JetBrains TeamCity.
Wiz customers can now secure everything they build and run on Akamai Linode Cloud, providing organizations the broadest cloud coverage out of any CNAPP
Wiz customers can now detect vulnerabilities in MacOS workloads and their software components with agentless scanning, and assess their secure configurations against built-in CIS Benchmarks for Apple MacOS
In this post, we take a closer look at the Digital Operational Resilience Act (DORA), and discuss how Wiz can help financial institutions navigate these new regulations.
Introducing the "Zero Critical Club" — a growing group of Wiz customers who've achieved the extraordinary feat of having zero critical issues in their environments.
We explore “proof-of-storage" cryptocurrencies like Chia, the potential for proof-of-storage cryptojacking attacks, and steps defenders can take to detect them.
In cloud security, the most compelling love story is the one between developers and security teams. This Valentine’s Day, let's shine a spotlight on these dynamic duos.
Fortinet offers guidance to detect and mitigate CVE-2024-21762 and CVE-2024-23113, critical RCE vulnerabilities in FortiOS and FortiProxy, including guidance that organizations should patch urgently.
We explore how advancements in EKS Access Entries and Pod Identity have opened new attack vectors and offer examples of how adversaries could exploit them.
Get a detailed analysis of the entire attack chain of Microsoft's breach by Midnight Blizzard (APT29), as well as detection and mitigation recommendations.
Secure Microsoft Azure AI Services, including Azure OpenAI, with Wiz AI-SPM providing full visibility into AI pipelines and risks on the Wiz Security Graph
The Wiz research team unpacks the security implications of the new EKS access and identity management features and recommends best practices when using them.
Detect and mitigate CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893, critical vulnerabilities in Ivanti VPN products. Organizations should patch urgently, and government agencies are instructed to isolate Ivanti VPN instances.