Custom runtime rules and runtime response policies: new layers of defense
Wiz's custom runtime rules and runtime response policies add new layers to your defense-in-depth strategy.
Wiz remediation and response: enforcing security best practices and responding to incidents made easy
Powerful new remediation and response capabilities enable the real-time enforcement of organizational security policies and streamline incident management.
Critical RCE vulnerability in PHP CGI: everything you need to know
Detect and mitigate CVE-2024-4577, a critical remote code execution vulnerability in PHP CGI. Organizations are advised to patch urgently.
Pause off my cluster: DERO cryptojacking takes a new shape
Learn how the threat actors behind the 2023 DERO cryptojacking campaign have adapted their techniques to evade detection, and the best practices for mitigation.
Sail Further with Wiz Cost Optimization for Amazon EKS
Learn how Wiz's latest feature identifies outdated EKS clusters, helping organizations save millions on cloud spend. Find out how to optimize costs and reinvest savings in strategic initiatives.
Wiz achieves StateRAMP authorization
Great news for State and Local Governments! Wiz for Gov is now StateRAMP authorized
Wiz AI-SPM model scanning: Securely innovate with AI community models
Detect malicious hosted AI models with Wiz AI-SPM and gain confidence in the models your data scientists use
Wiz launches new data center in UAE, supercharging global operations in the region
Organizations in the region can now benefit from Wiz's cloud security platform while maintaining their data sovereignty and privacy requirements.
Empowering SecOps in the cloud: enhancing threat detection with Wiz and Google Security Operations
Wiz announces integration with Google Security Operations to help SecOps teams identify critical cloud security issues.
The risk in malicious AI models: Wiz Research discovers critical vulnerability in AI-as-a-Service provider, Replicate
The Wiz Research team's investigations into AI-as-a-service providers reveals a major risk to AI systems.
Shifting from CWPP to CNAPP: new standards for cloud security
Learn where CNAPP and CWPP overlap, where they differ, and how the market is shifting to the more comprehensive and integrated CNAPP.
Wiz achieves Red Hat Vulnerability Scanner Certification
Wiz’s vulnerability scanning is now certified by Red Hat, providing customers with refined assessment of vulnerabilities for Red Hat Products
The magic of inclusion: Wiz’s journey to democratize cloud security
Empowering every cloud security stakeholder by eliminating barriers.
The wait is over: Wiz releases real-time CSPM
Prevent misconfigurations in your environment from being exploited with Wiz’s real-time CSPM.
Unveiling the power of Wiz's Security Graph with automated blast radius and root cause analysis for cloud incident response
Wiz assists Incident Response (IR) and SOC teams with containment through automated assessment of security incidents by identifying possible root causes and calculating the potential blast radius of compromised resources.
Celebrating Our $1 Billion Funding Round and $12 Billion Valuation
Extending a heartfelt thanks to our customers, investors, and Wizards
What does "Platform" mean in cloud security?
Enabling security outcomes for cloud builders and defenders, from code to cloud to defense.
CVE-2024-4040 exploited in the wild: everything you need to know
Detect and mitigate CVE-2024-4040, a critical vulnerability in CrushFTP exploited in the wild. Organizations should patch urgently.
Stay safe with Wiz's winning hand for securing Kubernetes
Ensure that your Kubernetes environments are secure and follow OWASP's Kubernetes Top 10 framework. Generate reports quickly and easily and remediate any issues with actionable insights.
Expanding coverage with Linux runtime
Wiz announces its Runtime Sensor for Linux, expanding coverage of threat detection and response for cloud workloads.
Boosting efficiency with Wiz's AI-driven remediation steps powered by Amazon Bedrock
Wiz introduces AI-remediation steps powered by Amazon Bedrock to empower customers to remediate risks quickly.
What does "democratizing cloud security" mean?
Due to the unprecedented growth of cloud technology, the democratization of cloud security -- making everyone in an organization a stakeholder in security practices -- has become a necessity. But how do organizations undertake this mission?
Wiz Acquires Gem Security to Reinvent Threat Detection in the Cloud
We’re pushing for consolidation, bolstering our Cloud Detection and Response capabilities, and delivering on the promise of security operations for the cloud era.
Operationalizing cloud security with Wiz and Tines
The Wiz and Tines partnership combines the benefits of visibility and automation, creating an improved cloud security strategy.