Wiz

Wiz

Computer and Network Security

New York, NY 267,415 followers

Secure everything you build and run in the cloud

About us

Organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, OCI, Alibaba Cloud and Kubernetes so they can build faster and more securely.

Website
https://www.wiz.io
Industry
Computer and Network Security
Company size
501-1,000 employees
Headquarters
New York, NY
Type
Privately Held
Founded
2020

Products

Locations

Employees at Wiz

Updates

  • View organization page for Wiz, graphic

    267,415 followers

    🎆 How can you start the new year with a secure cloud? Make it your New Year's resolution to eliminate misconfigurations in your #AWS OIDC integrations! AWS OIDC integrations have vendor specific nuances that can lead to misconfigurations if setup incorrectly. A mistake here can lead to confused deputy issues, where other customers of a vendor may be able to access your AWS accounts. We looked at over two dozen common integrations to learn what critical conditions are needed to avoid mistakes. 🤓 Learn more: https://lnkd.in/enGm-Gsn

    • No alternative text description for this image
  • View organization page for Wiz, graphic

    267,415 followers

    How did Cribl gain visibility across its rapidly expanding cloud environments? Faced with challenges like resource sprawl, misconfigurations, and vulnerabilities across their rapidly growing cloud environments, Cribl's team needed a solution to streamline security and scale with confidence. By partnering with Wiz and adopting #CNAPP, they achieved: ✅ Clear visibility into their cloud environment ✅ Automated workflows to reduce remediation times ✅ Identified and removed unused resources to optimize costs Now, Cribl's security team is building scalable processes to support growth while maintaining security. Check out the full story: https://lnkd.in/eACA_hqW

    • No alternative text description for this image
  • View organization page for Wiz, graphic

    267,415 followers

    🎙️ Every great story starts with a beer in the Alps... 🏔️ From building #Adallom to becoming a sommelier — hear Roy Reznik's journey as Co-Founder and VP R&D at Wiz in our podcast season finale! In this episode Eden Naftali & Amitai Cohen dive into: ☁️ Roy's journey from Tel Aviv to London-culture. 🛠️ How companies can scale fast while staying secure. 💡 How R&D should foster a culture where developers proactively embrace security as a core value. 🤖 Thoughts on AI in development — Co-Pilots: where do they excel? 🔗 Catch the #cryingoutcloud episode here: 🍏 https://lnkd.in/eQ8bWPBW 🎧 https://lnkd.in/eKRkAcm3 📺 https://lnkd.in/eQVs75dZ

  • View organization page for Wiz, graphic

    267,415 followers

    How did BMW shift gears in their cloud security together with Wiz? 🚗 👇 BMW Group needed to enable cloud innovation while maintaining strong security, all without slowing teams down. "Every team must fix the issues. Wiz gives them all of the information and also gives them a guide on how to remediate". -Guido Roesler, Manager of IT Operations, BMW. Here's how they did it: ⚙️ Wiz connected across multiple clouds, connecting between DevOps and security teams. 🔍 Our agentless, cloud-agnostic platform gave BMW a clear view of their entire cloud infrastructure. 💡 Developers at BMW received security issues with easy-to-follow fixes. The result? BMW increased its cloud adoption with a strong emphasis on digitalization leading to a 95% decrease in critical cloud security issues [with no speed bumps 🙃]. Explore the full story: https://lnkd.in/dCkBfuxURoland Lechner Karl Klostermann

  • View organization page for Wiz, graphic

    267,415 followers

    🔍 NEW malware alert: #Diicot threat group's advanced #Linux campaign 🚨 Recently, the Wiz threat research team uncovered a new malware campaign by the Romanian #Diicot threat group [aka #Mexals]. This campaign showcases significant advancements in tactics, targeting Linux systems, including those in cloud environments. What's new in this iteration? 💻 Malware adapts based on the environment—focusing on spreading in cloud setups and deploying cryptominers elsewhere. 🔧 From go-based tools to modified UPX packers designed to evade detection, the attackers are evolving rapidly. 🌐 Shifting from discord-based C2 to HTTP, using Zephyr protocol for cryptomining, and introducing new servers and wallets. 🔑 Systems running OpenSSH with weak credentials are prime candidates for compromise. 🛡 What can you do? - Enforce strong SSH credentials and limit access. - Monitor for unusual activity, such as outbound connections to suspicious domains or IPs. - Update and patch Linux distributions to avoid known vulnerabilities. Learn more about the tactics, infrastructure, and how to safeguard your systems: https://lnkd.in/e7e-9VUi

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

Wiz 8 total rounds

Last Round

Series unknown
See more info on crunchbase