Opens profile photo
Follow
Wiz
@wiz_io
Secure everything you build and run in the cloud
Global 🌎wiz.ioJoined June 2020

Wiz’s Tweets

Come say hello at #VMwareExplore today! 👋 We'll be happy to help you define your cross-cloud security strategy. We're at booth 508 💪
Image
Image
1
7
Thanks for writing about us, 🏆
Quote Tweet
Wiz unveils a new vSphere integration at VMworld to enable security teams to better discover vulnerable virtual machines in hybrid cloud environments #VMworld #hybridcloud #virtualmachines #cybersecurity venturebeat.com/security/wiz-v
9
(2/2) Buffer overflow vulnerabilities like these are difficult to exploit and usually require specific exploits per target application. We assume we will not witness widespread exploitation attempts applicable to just any OpenSSL client/server, but rather app specific exploits.
Show this thread
(1/2) The vulnerability mostly impacts SSL clients, while the SSL server attack scenario is less common. This is good news. We are still investigating attack scenarios for SSL servers.
1
Show this thread
We’re trying to keep it together, but we are so honored to win the BEST SOCKS award at 🏆🤯 This is, truly, a proud moment. See what it’s all about - image in thread! 🦄🧦🦄🧦
Embedded video
0:46
428 views
2
18
Show this thread
Big news today! We’re building upon the foundation of what has made Wiz so impactful for customers by introducing the new Wiz Kubernetes Admission Controller, and the first automated Kubernetes-to-cloud lateral movement path analysis. Check it out:
19
Cloud lateral movement is a real risk 🥷 How do we know? 58% of cloud environments have publicly exposed workloads with a cleartext long-term cloud key. The Wiz Threat Research team dives in on lateral movement techniques & defense guidance 👇
18
✈️ shifts left with Wiz 💫 Andrew McKenna discusses how the online travel agency rolled out Wiz to proactively prevent risks in its cloud development pipeline, rather than responding to them in production.
Image
9
📢 #AWS re:Invent is approaching! Join us in Las Vegas on Nov. 28th - Dec. 2nd at Booth #419 to explore how Wiz can help you secure your AWS EC2 instances, EKS and Lambda functions from build time to run time.
Image
7
So, you know you have cloud risk, now what? Hear from Product Manager George Pisha on the value of providing customers with recommendations on what they can fix and how they can do it based on Wiz’s risk prioritization.
Embedded video
0:19
243 views
12
Wiz research makes the cloud more secure once again 🙌
Quote Tweet
‘Severe’ Oracle Cloud Infrastructure Vulnerability Found, Fixed: @wiz_io: okt.to/Q2ju4a @Oracle quickly fixed the problem before it could be exploited by attackers to access customers’ data. #OracleCloud #OraclePartnerNetwork
Image
16
New research: Wiz finds critical cloud isolation vulnerability #AttachMe in OCI, which could have allowed unauthorized access to the cloud storage volumes of any OCI customer. OCI patched the vulnerability within hours with no customer action required.
1
35
VP of Product and co-founder discusses how Wiz makes cloud technologies more accessible to teams in order to achieve their goals.
Embedded video
0:30
153 views
9
Wiz CEO and co-founder joins to discuss the future of cloud security.
Quote Tweet
Three days, five questions, 20 leaders. Take a look at what’s to come in this year’s #FutureInFive. #maketheconnection
Show this thread
Embedded video
1:00
5.9K views
11
Wiz Product Management Director Mattan Shalev discusses the value of risk-based prioritization and how Wiz helps organizations cut down on alert fatigue.
Embedded video
0:41
417 views
14
Fox Corporation has shed its legacy approach to technology and adopted a modern way of doing business. As part of this transformation, listen to CISO discuss how Wiz helped Fox achieve their goal of democratizing security: wiz.io/customers/fox
Embedded video
0:37
110 views
5
Have you stopped by Booth #423 at the AWS summit in Chicago? Stop by to say hello to our team and learn how Wiz can help you identify and remove the most critical risks facing your cloud
Image
Image
Image
11
From file overwrite with uncontrolled content to root shell 🏴 How to elevate Linux privileges to root when it's only possible to overwrite files with uncontrolled content? I found a cool trick to do exactly that during our GCP PostgreSQL research we presented at Black Hat 🧵
Image
30
263
Show this thread
Amazing recognition from for our two incredible milestones over the last week. Thank you to our customers for helping to get us here.
Image
Image
32