Blog
Wiz Data Foundations: Where’s My Sensitive Data—And Who Can Access It?
A hands-on walkthrough of how to use Wiz to find sensitive data and uncover who can access it.
Introducing the MCP Server for Wiz: Smarter AI Context, Stronger Cloud Security
Unified model context, real-time security answers, and a faster path to remediation.
Research Briefing: MCP Security
The present and future of security for the Model Context Protocol.
CIEM and Secure Cloud Access: Best Practices from Wiz and CyberArk
Learn how to secure your cloud identities and operationalize Zero Standing Privileges with the Wiz and CyberArk integration
Insights from the field: Key Findings from the ICIT report on Government Cloud Security
Wiz partnered with the Institute for Critical Infrastructure Technology (ICIT) publishing a report around findings from a survey given to federal and state agencies, highlighting the growing importance of cloud and AI technologies, and concerns around available resources and data protections.
Top security talks from KubeCon Europe 2025
Many of the talks at KubeCon Europe, Europe’s largest open source community conference, were related to security. Let's discuss some of our favorites.
Crying out Cloud: Our Favorite Stories of 2024
Check out our top podcast episode picks from the past year.
Introducing Wiz Defend: Redefining a new standard for cloud detection and response
Accelerate your cloud SecOps transformation.
CPU_HU: Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims
Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.
IngressNightmare: CVE-2025-1974 - 9.8 Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX
Over 40% of cloud environments are vulnerable to RCE, likely leading to a complete cluster takeover.
How to use the new CloudTrail network activity events for AWS VPC Endpoints
Learn how AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
Securing Cloud Databases: Best Practices with ClickHouse and Wiz
How to protect sensitive data in cloud-hosted databases with built-in security controls, best practices, and continuous risk monitoring.
New GitHub Action supply chain attack: reviewdog/action-setup
A supply chain attack on tj-actions/changed-files caused many repositories to leak their secrets over the weekend. Wiz Research has discovered an additional supply chain attack on reviewdog/actions-setup@v1, that may have contributed to the compromise of tj-actions/changed-files.
GitHub Action tj-actions/changed-files supply chain attack: everything you need to know
A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk.
Key Takeaways from the 2025 State of AI in the Cloud Report
From DeepSeek adoption to impact on security and governance.
Introducing new Slack AI App for Wiz and Bi-Directional Slack Integration
Wiz enhances Slack integration to streamline risk investigation and response and bring security knowledge directly to Slack
Emily Heath’s 5 Key Questions CISOs Should Ask Before Board Meetings
Experts share a powerful framework and strategies for effective board meeting preparation and communication.
Wiz Named #1 CDR Solution by G2
Wiz was named the leader in the Winter 2025 CDR Grid Report, based on independent customer reviews.
2025 State of Code Security: Key Trends and Risks
Explore the key insights on code and cloud security risks shaping 2025.
Introducing Wiz Lens: Role-based views for every security team
Empowerment and speed for security teams without losing unified cloud context.
The Role of Runtime Security in Cloud Environments
Discover how Wiz's innovative hybrid approach revolutionizes runtime security for the modern cloud era.
The Overlooked Attack Surface: Securing Code Repositories, Pipelines, and Developer Infrastructure
Learn how Wiz for ASPM extends security to developer infrastructure by continuously enforcing secure defaults and detecting threats across the software supply chain.
Dev and Sec: The Perfect Pair <3
Discover how this dynamic duo creates secure, agile environments – and how you can foster their romance in your organization.