{"id":560477,"date":"2026-03-24T05:33:15","date_gmt":"2026-03-24T05:33:15","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/560477\/"},"modified":"2026-03-24T05:33:15","modified_gmt":"2026-03-24T05:33:15","slug":"wiz-launches-ai-application-protection-platform-ai-app","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/560477\/","title":{"rendered":"Wiz Launches AI Application Protection Platform (AI-APP)"},"content":{"rendered":"<p class=\"\">AI hasn\u2019t just changed how we build \u2014 it has fundamentally changed how risk emerges.<\/p>\n<p class=\"\"><a href=\"https:\/\/www.wiz.io\/blog\/complete-ai-application-visibility-wiz\" rel=\"nofollow noopener\" target=\"_blank\">AI applications<\/a> are dynamic, interconnected systems \u2014 combining models, agents, tools, data, and infrastructure across code, cloud, and runtime.<\/p>\n<p class=\"\">To unlock the full value of these systems, organizations are connecting them to production environments, granting access to sensitive data, and enabling them to take action across their systems.This is where risk is introduced.<\/p>\n<p class=\"\">Most approaches still analyze infrastructure, identity, and applications in isolation \u2014 leaving teams without the context needed to identify real risk.\u00a0<\/p>\n<p class=\"\">Today, we\u2019re introducing the Wiz <a href=\"https:\/\/www.wiz.io\/academy\/ai-security\/ai-app-ai-application-protection-platform\" rel=\"nofollow noopener\" target=\"_blank\">AI Application Protection Platform (AI-APP)<\/a> \u2014 designed to secure AI applications end-to-end, with the context needed to understand real risk and act on it.<\/p>\n<p><a id=\"the-context-gap-in-ai-security-6\" class=\"relative -top-20\"\/>The Context Gap in AI Security<\/p>\n<p class=\"\">Security teams are left trying to answer:<\/p>\n<p class=\"my-0\">Where AI applications are running across my environment?<\/p>\n<p class=\"my-0\">What are their capabilities &#8211; what can they actually do?\u00a0<\/p>\n<p class=\"my-0\">Which of these actually represent real, exploitable risk?<\/p>\n<p class=\"my-0\">Can I detect and respond to threats across these AI applications in time?<\/p>\n<p class=\"\">Because <a href=\"https:\/\/www.wiz.io\/academy\/ai-security\/ai-security-risks\" rel=\"nofollow noopener\" target=\"_blank\">AI risk<\/a> doesn\u2019t live in a single layer.<\/p>\n<p class=\"\">It emerges when systems interact \u2014 across models, agents, tools, infrastructure, and data.<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAsAGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALCARACT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/>AI Risk Issue on Security Graph &#8211; Externally exposed agent with authentication bypass vulnerability exposing sensitive data<\/p>\n<p class=\"\">Consider a customer-facing AI chatbot connected to internal tools and data systems.<\/p>\n<p class=\"\">An attacker discovers an authentication bypass vulnerability \u2014 a common issue in rapidly built, \u201cvibe-coded\u201d applications \u2014 and uses it to <a href=\"https:\/\/www.wiz.io\/academy\/ai-security\/prompt-injection-attack\" rel=\"nofollow noopener\" target=\"_blank\">inject a prompt,<\/a> manipulating the agent into taking unintended action.<\/p>\n<p class=\"\">From there, the system behaves exactly as designed \u2014 but with unintended consequences.<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgWFgoVDiQaDQ0NDRUNFhYVFxUZGBYVIiEaHysjHR0oHRYWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHA0QHDsoIhw7LzsvLy87Oy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA8AGAMBIgACEQEDEQH\/xAAYAAEAAwEAAAAAAAAAAAAAAAAAAwUHAf\/EAB0QAAIABwEAAAAAAAAAAAAAAAABAgMEERIUISL\/xAAWAQEBAQAAAAAAAAAAAAAAAAAEAQD\/xAAZEQADAAMAAAAAAAAAAAAAAAAAAhEBISL\/2gAMAwEAAhEDEQA\/ANfU\/wBWsNjr4dhlrIOSrsvNNsp46\/CsYIaimW4wNVVgbOWp\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/><\/p>\n<p class=\"\">Each part of this activity, on its own, can appear expected:<\/p>\n<p class=\"my-0\">the prompt is processed as a normal model interaction<\/p>\n<p class=\"my-0\">the agent executes code to retrieve sensitive data \u2014 a capability it was designed to perform<\/p>\n<p class=\"my-0\">the resulting access and data movement appear as valid cloud activity<\/p>\n<p class=\"\">It\u2019s only when these are connected that the full AI <a href=\"https:\/\/www.wiz.io\/academy\/detection-and-response\/attack-path-analysis\" rel=\"nofollow noopener\" target=\"_blank\">attack path<\/a> becomes clear.<\/p>\n<p><a id=\"introducing-wiz-ai-app-19\" class=\"relative -top-20\"\/>Introducing Wiz AI-APP<\/p>\n<p class=\"\">The Wiz AI Application Protection Platform (AI-APP) brings together visibility, risk analysis, and runtime protection into a single, graph-powered platform \u2014 allowing teams to understand and secure AI systems as they actually operate. It is the natural evolution of the <a href=\"https:\/\/www.wiz.io\/academy\/cloud-security\/what-is-a-cloud-native-application-protection-platform-cnapp\" rel=\"nofollow noopener\" target=\"_blank\">Cloud-Native Application Protection Platform (CNAPP)<\/a> as organizations increasingly build AI-native applications.<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA0AGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALCARACT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/><\/p>\n<p class=\"\">This allows teams to move from understanding how AI systems are built, to identifying cross-layer risk, to detecting and responding to threats in real time \u2014 all in one place.<\/p>\n<p><a id=\"1-visibility--build-a-complete-ai-inventory-23\" class=\"relative -top-20\"\/>1. Visibility \u2014 Build a Complete AI Inventory<img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA4AGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALEAQgCT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/>AI Inventory<\/p>\n<p class=\"\">AI adoption spans managed services, SaaS platforms, and custom-built applications \u2014 creating blind spots across environments.<\/p>\n<p class=\"\">Wiz builds a <a href=\"https:\/\/www.wiz.io\/academy\/ai-security\/ai-inventory\" rel=\"nofollow noopener\" target=\"_blank\">complete inventory<\/a> of AI applications using multiple detection methods across all of them:<\/p>\n<p class=\"my-0\">Managed platforms \u2014 deep integrations with services like AWS Bedrock, Azure AI, and Google Vertex AI<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHEQgHBw8LCggJBw4QDgYGBxIJFgcNFx8ZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0NFQ4QHDscFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAwAGAMBIgACEQEDEQH\/xAAYAAACAwAAAAAAAAAAAAAAAAACAwABB\/\/EABgQAQEBAQEAAAAAAAAAAAAAAAABESEC\/8QAFgEBAQEAAAAAAAAAAAAAAAAAAgEA\/8QAGREAAQUAAAAAAAAAAAAAAAAAAAECERJR\/9oADAMBAAIRAxEAPwDYMTIHQW1UauhGcUVfVQ6Gk\/\/Z\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/>Agent hosted on AWS Bedrock  &amp;  the tools its connected to<img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAoAGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALCARACT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/>Agent built in Copilot studio with access to sensitive data in Sharepoint<\/p>\n<p class=\"my-0\">Custom and self-hosted AI \u2014 code and workload analysis to identify frameworks, agents, and services running in your environment<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA8AGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALEAQgCT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/>Custom hosted agent on the Wiz Security Graph<\/p>\n<p class=\"\">A key part of this is the Wiz Workload Explainer \u2014 which uses AI to detect and analyze how your AI applications are built, translating custom implementations into clear components that deterministic scanning alone cannot identify.<\/p>\n<p class=\"\">This enables Wiz to map AI systems end-to-end regardless of their architecture \u2014 including models, agents, tools, and data flows. Our goal is to let teams build AI applications in the way that works best for them, while providing consistent security across all of it.<\/p>\n<p class=\"\">In the chatbot example, this means identifying the agent service, underlying model, connected tools, and the infrastructure it runs on \u2014 even when they are not explicitly defined.<\/p>\n<p class=\"\">\ud83d\udc49 Explore more in our <a target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/complete-ai-application-visibility-wiz\" rel=\"nofollow noopener\">visibility deep dive<\/a>.<\/p>\n<p><a id=\"2-risk--understand-how-risk-emerges-across-layers-37\" class=\"relative -top-20\"\/>2. Risk \u2014 Understand How Risk Emerges Across Layers<\/p>\n<p class=\"\">AI risk is not defined by a single issue \u2014 but by how multiple conditions come together.<\/p>\n<p class=\"\">Wiz connects signals across the layers that make up an AI application.<\/p>\n<p class=\"\">In the chatbot risk example, these include:<\/p>\n<p class=\"my-0\">Infra &amp; Access \u2014 the AI agent is exposed through a public endpoint with an authentication bypass.<\/p>\n<p class=\"my-0\">Model &amp; Guardrails \u2014 the agent runs on an AI Model hosted in a PaaS with misconfigured guardrails<\/p>\n<p class=\"my-0\">Data \u2014 the model was trained on sensitive data\u00a0<\/p>\n<p class=\"my-0\">Application \u2014\u00a0 the agent has tools that allow it to read and expose the sensitive data.<\/p>\n<p class=\"\">Individually, each layer may appear benign. Together, they define whether an attack is possible.\u00a0<\/p>\n<p class=\"\">A key part of this understanding is how deeply Wiz analyzes AI components. For example, Wiz identifies and classifies the tools an agent can use \u2014 such as:<\/p>\n<p class=\"my-0\">reading or exposing data<\/p>\n<p class=\"my-0\">executing code<\/p>\n<p class=\"my-0\">interacting with APIs<\/p>\n<p class=\"my-0\">modifying infrastructure<\/p>\n<p class=\"\">This is one example of how Wiz continuously deepens its understanding of AI-native risk over time. By correlating signals across layers, Wiz maps real, exploitable attack paths.<\/p>\n<p class=\"\">Wiz also maps AI risks to frameworks like the OWASP Top 10 for LLM Applications \u2014 helping teams prioritize issues in the context of real-world standards and compliance requirements.<\/p>\n<p><img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA8AGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALEAQgCT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/><\/p>\n<p class=\"\">\ud83d\udc49 Explore more in our <a target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/reducing-ai-risk-across-ai-applications\" rel=\"nofollow noopener\">risk deep dive.<\/a><\/p>\n<p><a id=\"3-runtime--detect-and-respond-to-ai-threats-49\" class=\"relative -top-20\"\/>3. Runtime \u2014 Detect and Respond to AI Threats<img decoding=\"async\" aria-hidden=\"true\" alt=\"\" src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAA8AGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/AK+AJACT\/9k=\" style=\"transition:opacity 500ms;opacity:1;position:absolute;left:-5%;top:-5%;width:110%;height:auto;max-width:none;max-height:none\"\/><\/p>\n<p class=\"\">AI systems are dynamic \u2014 and attacks unfold in real time.<\/p>\n<p class=\"\">Wiz provides threat detection across three complementary layers:<\/p>\n<p class=\"my-0\">Model activity \u2014 monitoring inputs, outputs, and prompt behavior<\/p>\n<p class=\"my-0\">Workload execution \u2014 tracking agent execution, tool usage, and system activity<\/p>\n<p class=\"my-0\">Cloud layer \u2014 observing identity usage, API calls, and infrastructure changes<\/p>\n<p class=\"\">In the chatbot scenario, this means:<\/p>\n<p class=\"my-0\">identifying the manipulated prompt at the model layer<\/p>\n<p class=\"my-0\">detecting code execution and behavior on the host container<\/p>\n<p class=\"my-0\">and tracking credential usage and downstream activity in the cloud<\/p>\n<p class=\"\">Because this telemetry is connected back to the full application context, teams can: detect threats earlier, understand whether activity represents real exploitation and prioritize response based on actual impact<\/p>\n<p class=\"\">\ud83d\udc49 Explore more in our <a target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/ai-runtime-threat-detection-from-input-to-real-world-impact\" rel=\"nofollow noopener\">runtime deep dive<\/a><\/p>\n<p><a id=\"extending-ai-security-beyond-the-wiz-platform-58\" class=\"relative -top-20\"\/>Extending AI Security beyond the Wiz platform<\/p>\n<p class=\"\">To extend this even further, Wiz integrates with leading WIN AI partners, bringing the intelligence of the AI security ecosystem into Wiz:<\/p>\n<p class=\"my-0\">Cloudflare and Wiz integrate to surface which AI application endpoints are protected by Cloudflare\u2019s AI Security for Apps, highlighting what remains exposed so teams can reduce risk from prompt injection, PII leakage, and <a href=\"https:\/\/www.wiz.io\/academy\/ai-security\/shadow-ai\" rel=\"nofollow noopener\" target=\"_blank\">shadow AI<\/a>.<\/p>\n<p class=\"my-0\">TrojAI and Wiz integrate to bring AI red teaming findings from TrojAI into Wiz, revealing vulnerabilities like jailbreaks, prompt injection exploits, and data leakage from your AI Endpoints. Wiz enriches these Findings with cloud context to surface attack paths to your AI application, helping teams prioritize exploitable risks.<\/p>\n<p class=\"my-0\">Pillar Security and Wiz integrate to bring black-box agentic red team assessments from Pillar into Wiz, highlighting vulnerabilities at public-facing AI endpoints. By correlating these findings with existing risks across the environment, teams gain visibility into exploitable paths and can focus remediation on high-impact issues.<\/p>\n<p><a id=\"from-insight-to-action-61\" class=\"relative -top-20\"\/>From Insight to Action<\/p>\n<p class=\"\">Understanding risk is only part of the challenge.<\/p>\n<p class=\"\">Security teams need to operationalize it \u2014 turning insight into action across engineering, security, and platform teams.<\/p>\n<p class=\"\">Wiz enables teams to:<\/p>\n<p class=\"my-0\">prioritize real risk based on full context<\/p>\n<p class=\"my-0\">route issues to the right owners<\/p>\n<p class=\"my-0\">and drive remediation with clear, actionable guidance<\/p>\n<p class=\"\">This is powered by <a target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/introducing-wiz-agents\" rel=\"nofollow noopener\">Wiz Agents<\/a> \u2014 acting as force multipliers across the lifecycle:<\/p>\n<p class=\"my-0\">Red Agent identifies complex exploitable risk by reasoning like an attacker<\/p>\n<p class=\"my-0\">Green Agent determines what to fix and who owns it<\/p>\n<p class=\"my-0\">Blue Agent investigates threats and validates real impact<\/p>\n<p class=\"\">We are also extending this &#8220;insight to action&#8221; philosophy directly into the AI-SDLC. By injecting Security Graph context into AI development workflows, we enable agents to move beyond generic suggestions. Instead, they can automatically identify misconfigurations, prioritize fixes based on cloud-layer risk, and even perform real-time remediation before code is ever committed.<\/p>\n<p><a id=\"secure-ai-at-the-speed-of-ai-69\" class=\"relative -top-20\"\/>Secure AI at the Speed of AI<\/p>\n<p class=\"\">AI is changing how systems are built \u2014 and how attackers operate.<\/p>\n<p class=\"\">Security must evolve to match.<\/p>\n<p class=\"\">Wiz AI-APP is built for this new reality:<\/p>\n<p class=\"my-0\">cross-layer context to understand how AI risk actually emerges<\/p>\n<p class=\"my-0\">implementation-agnostic coverage across managed services, SaaS platforms, and custom-built applications<\/p>\n<p class=\"my-0\">and end-to-end visibility from code to runtime<\/p>\n<p class=\"\">Wiz AI-APP connects code, cloud, and runtime into a single platform \u2014 giving teams the context they need to understand and secure AI systems end-to-end.<\/p>\n<p class=\"\">Secure AI applications \u2014 from code to runtime.<\/p>\n","protected":false},"excerpt":{"rendered":"AI hasn\u2019t just changed how we build \u2014 it has fundamentally changed how risk emerges. AI applications are&hellip;\n","protected":false},"author":2,"featured_media":560478,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[256,254,255,64,63,105],"class_list":{"0":"post-560477","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-au","12":"tag-australia","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/560477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=560477"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/560477\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/560478"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=560477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=560477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=560477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}