Screenshot at

Sign up for Prowler Updates

Please enable JavaScript in your browser to complete this form.
Toni de la Fuente headshot
Toni de la Fuente // March 18, 2025

Google Bought Wiz for $32B. Now What?

Well, that escalated quickly.

Google just dropped $32 billion on Wiz—one of the biggest security acquisitions ever. That’s not just a big check; that’s a statement. A statement that cloud security isn’t just important—it’s the whole game now.

But here’s the thing: security isn’t something you buy. It’s something you do.

The Problem with Vendor-Led Security

Google, AWS, and Microsoft are all racing to “own” security in their cloud ecosystems. And let’s be honest—this move isn’t just about Wiz’s tech. It’s about control. Google isn’t buying a security tool, they’re buying deeper vendor lock-in.

The reality? We’ve not seen Multicloud security work when it’s controlled by a single provider. Features and functionality will always favour the “home team” in this scenario, a concerning thought for security teams securing AWS, Azure, Kubernetes, and everything in between. They need solutions that work across environments, not ones that push them further into a walled garden.

Why This Matters & Why This is Huge News

$32 billion isn’t just a headline—it’s validation. Cloud security isn’t an afterthought anymore; it’s the most important problem to solve in modern infrastructure. And if you’re running in the cloud, this should make you sit up and pay attention.

Here’s why: attackers aren’t waiting for your vendor to catch up. Security threats evolve daily, whether it’s misconfigurations, supply chain attacks, or identity-based exploits. If your entire security strategy depends on tools from the same provider where your workloads live, you’ve already lost visibility. Relying on security that’s built into your cloud provider means you’re trusting them to detect, mitigate, and respond to threats on their terms.

Real security isn’t a one-time purchase—it’s an ongoing process of vigilance, iteration, and improvement. The best security comes from open collaboration, continuous learning, and tools that work the way you need them to—not just the way a vendor wants them to.

Security Isn’t a One-Time Fix

Security isn’t a product you buy once and call it a day. It’s an ongoing process of vigilance and adaptation. The strongest security doesn’t come from billion-dollar acquisitions—it comes from open collaboration, continuous improvement, and shared knowledge.

If we’ve learned anything, it’s that open-source security moves the industry forward. Not closed platforms, not dashboards built for procurement teams—real, transparent, adaptable security.

At Prowler, we believe security should be:
✔️ Open—so you can inspect, modify, and improve it.
✔️ Multicloud—so it works where you work, not just where the vendor wants you to be.
✔️ Built for practitioners—so you get real security, not just another checkbox.

What Happens Next?

While the hyperscalers battle it out with billion-dollar checkbooks, security teams still need real solutions—ones that are open, adaptable, and built for the reality of multicloud environments.

Congrats to the Wiz team on the exit. But let’s not forget: security isn’t a product, it’s a process. And the best security? It happens in the open.

Recent Articles

py iam expand
August 21, 2025

Unmasking Hidden Dangers: How Prowler Now Detects Obfuscated IAM Policies

It all started with a fascinating blog post from the team at Permiso introducing their "Sky Scalpel" tool. Their research highlighted a clever technique for hiding dangerous permissions within AWS...

bedrock header
August 12, 2025

Bedrock’s New API Keys: Convenience at a Hidden Security Cost

Recently, the AWS team rolled out the red carpet for a slick new feature in their post, "Accelerate AI development with Amazon Bedrock API keys." The promise was a dream...

June 24, 2025

CSPM for GCP: Securing Your Google Cloud Environment with Modern Cloud Security Posture Management

Modern organizations rapidly embrace the Google Cloud Platform for its scalability, innovation capabilities, and cost-effectiveness.  However, this digital transformation comes with a critical challenge: maintaining robust security across increasingly complex...