Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»News»Introducing Wiz Defense | Waze Blog
News

Introducing Wiz Defense | Waze Blog

CloudSecNewsHubBy CloudSecNewsHubDecember 2, 2024No Comments8 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Introducing Wiz Defense | Waze Blog
Share
Facebook Twitter LinkedIn Pinterest Email

Today, we're excited to announce the public preview of Wiz Defend, the future of cloud detection and response (CDR). Defend represents the latest addition to our platform to help organizations secure their cloud at the speed of the cloud.

With Wiz Cloud, we enable cloud security and development teams to quickly eliminate the most critical risks. With Wiz Code, we empower development and application security teams to quickly build securely from the first line of code. Now, Wiz Defend brings SecOps teams into the cloud operating model and gives them the context needed to make the right decisions faster. Security analysts, incident responders, and threat hunters get accurate detections that eliminate noise, real-time protection, automation that resolves threats 10x faster, and improved resiliency from addressing the root cause of incidents contained in code.

Wiz Defend has transformed our approach to cloud detection and response by providing the precise detections and context we needed but never thought possible. The MITRE ATT&CK framework is my north star, and with an incident preparedness dashboard that automatically maps our telemetry to the framework, we can quickly identify gaps and focus our efforts on addressing them. Clear workflows and automation help us close the skills gap, enabling junior analysts to tackle more complex investigations. With Wiz Defend, we're no longer buried in alert noise – we have the clarity and confidence to respond quickly and effectively to threats.

Susan Sinoff, CISO – PROS

SecOps teams have one of the most challenging and stressful sets of jobs within any organization. Every decision carries serious repercussions, and the workload never ends. The cloud has magnified these difficulties:

The attack surface has expanded dramatically, forcing teams to monitor complex threats such as lateral movement, container escapes, and automated IAM attacks. In response, teams must collect and correlate telemetry across the identity, data, network, compute, secrets, and PaaS layers in the cloud.

Traditional SecOps tools, such as SIEM and EDR, have been adapted from on-premises tools and are not suited to the complexity and sheer volume of activity in the cloud. As a result, detection engineers were burdened with manually writing detection rules with the SANS Cloud Security Survey reporting that “57% of organizations… were unable to keep up with the rapidly evolving (cloud) threat landscape.

Investigating cloud attacks requires specialized domain knowledge of each cloud and architecture used. Responding requires convincing the application development team to take action. As a result, teams must invest in upskilling their employees or outsource to third parties.

SecOps teams have done a great job of building local detection and response operations at the cost of significant effort. The founders of Gem Security, which Wiz acquired in April 2024, have lived this pain through decades of incident response and set out on a mission to reinvent threat detection in the cloud with a SecOps-first solution. Defense is the result of Gem rebuilding on top of the Wiz Security Graph to enable SecOps teams of all sizes and maturity dates to effectively manage the full incident response cycle in the cloud.

Wiz Defend is a complete suite of detection, investigation and response capabilities for SecOps to protect their cloud environments from threats.

Prepare for breach detection and investigation: Continuously close visibility gaps by identifying missing telemetry, incomplete uptime coverage, and providing actionable recommendations, aligned with the MITER ATT&CK framework.

High-accuracy threat detection across the attack kill chain: Run granular cross-layer threat detection, powered by our Wiz Research team, to reduce noise and wasted effort. Thousands of built-in detections that combine cloud control plane, data, network, identity, SaaS infrastructure, and workload runtime via eBPF-based sensor, behavioral baselines provide broad coverage of the breadth of current and emerging cloud threats.

Investigate faster with context and AI: Dramatically accelerate root cause analysis and reduce mean time to response (MTTR) with a simplified, unified and visual story that lets you focus on the investigation rather than manual data collection and correlation. AskAI Copilot creates rich incident stories that explain the evolution of the attack and its potential impact in natural human language. It goes further to automatically answer the next investigative questions a SecOps analyst might ask, such as “How did the attacker gain access to this principle?” or “What else might the attacker do in the environment?”

Respond and contain quickly: Stop incidents before they impact the business by blocking threats at runtime or triggering one-click containment guides of threat issues. Use AI to create remediation and response steps based on the course of action your IR team wants to take. You can integrate with SIEM or SOAR to streamline workflow for your SecOps team.

So how does this really work? Let's examine SeleniumGreed – a cloud-native attack, first documented in January 2024 by the Wiz research team. It exploits vulnerabilities in the Selenium application testing framework, estimated to exist in 30% of cloud environments, to achieve remote code execution.

Imagine an attacker targeting a Selenium service running in an AWS Kubernetes environment. The attacker will exploit the Selenium service to open a reverse shell and establish a foothold on the compromised host. From there, the attacker locates the AWS credentials and exfiltrates them from the host to move horizontally to the control plane, and finally exfiltrates data from the sensitive AWS S3 bucket.

Wiz Defend flags this threat at every stage of the attack lifecycle, enabling teams to contain the threat actor at every stage. The Wiz sensor deployed on the node immediately detects the reverse shell and sends an alert to the security operations team. By running it in blocking mode, the sensor kills the malicious process immediately and stops the attack. But if blocking is not enabled for backfire and the attack continues, the defense will detect each subsequent phase of the attack as well.

When the attacker moves to the control plane, Wiz links the keys used in the exfiltration attempt to the compute node targeted in the original attack, and presents both detections in a single timeline and graph to the SecOps team, along with actionable recommendations for containment (kill the malicious process, rotate compromised credentials, And fix misconfigured Selenium service.

Instead of tedious manual querying in SIEM and endless click-throughs in EDR, Wiz provides a seamless experience across the entire cloud environment. SecOps teams detect the threat in real-time and get the context they need to investigate and respond immediately – all in one platform.

The Wiz Integration Network (WIN) features more than 100 integrations, enabling customers to bi-directionally embed Wiz into their existing security workflow. With the launch of Wiz Defend, we are expanding the scope of WIN to support SecOps teams, bringing Defend's threat context directly into their workflow – democratizing data, providing insights into cloud threats where SecOps teams operate, and maximizing the value of existing tools.

WIN includes integrations with core components of the SecOps workflow, such as SIEM, SOAR, MDR, and threat detection and intelligence tools. For the Defend launch, we are proud to partner with leading vendors empowering SecOps teams: Cribl, Exabeam, Expel, Panther Labs, ReliaQuest, Tamnoon, Tines, and Torq.

Through these integrations, Wiz Defend delivers critical threat context directly into the tools that SecOps teams rely on, simplifying the detection, investigation, and remediation process.

Wiz Defend provides an opportunity to replace drudgery and legacy tools with automation and context, so SecOps can act faster and focus on higher-value initiatives.

Wiz Defend has brought data across our event sources together to help investigate detections from start to finish. From our Identity Provider logs that identify the actor to Wiz runtime events that show individual process execution and network activity. From Wiz Defend, we have confidence in our detection and investigation capabilities with better visibility into our cloud activity thanks to their new VPC log sources. The latter gave us the opportunity to move away from costly detection services, providing a clearer detection strategy and more control over our detection logic.

Nate Stevens, Cloud Security Architect – Maleon

Effective cloud security requires a new operating model — one that fosters collaboration, builds shared context, and democratizes security. This model opens the security flywheel: CloudSec proactively reduces the attack surface, SecOps monitors remaining risks and responds to threats, and developers fix the root cause in the code. No more isolation, just end-to-end security that moves at the pace of cloud innovation.

Wiz Defend is the bridge between Developers, CloudSec, and SecOps, breaking down the organizational silos that bring together the teams required to achieve effective cloud security. Defense is the latest example of the product segment being fully integrated into the Wiz platform. Wiz offers a leading solution that addresses the challenges modern SecOps teams face in the cloud

Tyler Shields, Principal Analyst – Enterprise Strategy Group.

Join us in shaping the future of cloud security. We invite you to try Wiz Defend, now in public preview. Register for a live demo today, see Defense in action with the latest PAN-OS exploit, or join our upcoming webinar to see how Wiz Defend can transform your SecOps.

Blog Defense introducing Waze Wiz
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCloud security company Upwind confirms it has raised $100 million at a $900 million valuation
Next Article AWS targets cloud security with its incident response platform
admin
CloudSecNewsHub
  • Website

Related Posts

News

How to pick up criminal evidence for Microsoft 365

May 8, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
News

Artificial intelligence agents to convert Google Cloud Security Ops

May 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?