CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

What is business email compromise (BEC)?

Wiz Experts Team

Business email compromise is a targeted cyberattack where criminals impersonate someone you trust—like your CEO, a vendor, or a business partner—to trick you into sending money or revealing confidential information.

What is arbitrary code execution? ACE attacks explained

Wiz Experts Team

Arbitrary code execution is when an attacker tricks your system into running their malicious code without permission. Think of it like someone breaking into your house and using your computer to do whatever they want.

What are backdoor attacks in cloud environments?

Wiz Experts Team

A backdoor attack creates a hidden method for bypassing standard authentication or security controls in a computer system, application, or network. Think of it as a secret entrance that allows attackers to return to a compromised system whenever they want, without going through the front door.

See Wiz in action

Wiz connects the dots across your cloud, from code to runtime.

For information about how Wiz handles your personal data, please see our Privacy Policy.

Wiz wand

What is runtime cloud security?

Wiz Experts Team

Successful security programs utilize runtime signal analysis with cloud context to eliminate unnecessary alerts and focus on exploitable threats—active malicious behaviors, suspicious identity patterns, and attack paths—not just static vulnerabilities.

What is a YAML File in Kubernetes?

Wiz Experts Team

Kubernetes YAML is the declarative file format Kubernetes uses to define, configure, and manage cluster resources.

Top 9 OSS API Security Tools

Wiz Experts Team

A guide on the 9 best OSS API security tools that protect sensitive data, infrastructure, and business logic from unauthorized access, data theft, and other attacks.

What is zero trust data security?

Wiz Experts Team

Zero trust data security extends traditional zero trust principles to data protection by requiring continuous verification.