News
Compliance As Code Explained: Benefits And Implementation | Wiz
19+ hour, 11+ min ago (1223+ words) Only 13% of organizations have adopted compliance as code, but traditional manual workflows often lack the visibility needed to keep pace with cloud-native deployment speeds. Writing policies is straightforward. Enforcing them continuously, with enough context to prioritize what actually matters, is…...
API management: Fundamentals for cloud security teams | Wiz
18+ hour, 59+ min ago (1075+ words) API management is about how you actually govern and protect your cloud app's biggest attack surface'your APIs'from day one. A unified API management layer standardizes authentication and policy enforcement at core control points'your edge gateways and ingress controllers. It provides…...
Top Threat Intelligence Tools for 2026 and Beyond | Wiz
4+ day, 17+ hour ago (1313+ words) Threat intelligence tools enable you to manage, analyze, and use threat information for effective risk mitigation strategies. Not all threat intelligence tools are equal. Feed quality, analytic depth, and integration maturity make or break their value. Threat data feed quality…...
Axios NPM Distribution Compromised in Supply Chain Attack | Wiz Blog
4+ day, 6+ hour ago (279+ words) A compromised axios maintainer account led to malicious npm releases that propagated across environments. Learn how to assess impact, detect compromise, and secure your development workflows. The malicious package includes a dropper (setup.js) that downloads and executes platform-specific second-stage…...
The Top 28 Open-Source Security Tools: A 2026 Guide | Wiz
5+ day, 2+ hour ago (1617+ words) Teams adopting OSS solutions should look for tools that embed seamlessly into CI/CD and pair well with cloud-native environments. Open-source tools frequently fail to identify whether a vulnerable function is truly reachable, exploitable, or exposed. Code security combines practices…...
Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI | Wiz
5+ day, 21+ hour ago (181+ words) Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI'wiz.io Cloud Threats Retrospective 2026: Threat Actor Behavior in the Age of AI In 2025, cloud threat activity was driven less by novel exploits and more by the relentless weaponization of…...
Wiz Earns Microsoft Certified Software Status | Wiz Blog
1+ week, 1+ day ago (505+ words) Verified by Microsoft. Built for Azure. Secured by Wiz. Wiz has officially earned the Microsoft Solutions Partner with certified software designation for Azure. This milestone proves that our security-first architecture meets Microsoft's highest standards for cloud-native solutions and reflects our…...
What is AI Incident Response: A Practical Overview | Wiz
1+ week, 1+ day ago (710+ words) AI incident response refers to two related disciplines: using AI to accelerate how security teams detect, investigate, and contain threats, and responding to security incidents that specifically target AI systems like models, agents, and inference pipelines. The biggest bottleneck in…...
Introducing Wiz Workflows: Build a Self-Healing Cloud | Wiz Blog
1+ week, 2+ day ago (640+ words) AI isn't just helping developers write code: it's reshaping the entire development lifecycle. With AI-assisted tools, agents, and MCP integrations speeding up development, the cloud footprint behind every application is growing and diversifying fast, making cloud security more critical than…...
Introducing the Wiz Red Agent- AI-Powered Attacker | Wiz Blog
1+ week, 4+ day ago (955+ words) Red Agent is an AI-powered, context-aware attacker that uncovers complex exploitable risks across your entire attack surface, continuously and at scale. In early testing with design partners, Red Agent has already identified critical vulnerabilities that remained undetected despite extensive manual…...