Vikram Kapoor - Founder, Chief Technical Officer, Author at Lacework

Search Results

Results For:
Blog

50 CISOs to watch

The role of CISO is one of the most important in any organization, and one that holds some of the most significant responsibilities: keeping… Read More

MEHR LESEN
Blog

Shining a new light on security in the cloud era

Cloud computing is fundamentally transforming the way people interact with the world and how companies get business done. And while the cloud has allowed businesses… Read More

MEHR LESEN
Blog

What is the Difference Between Performance and Security Monitoring?

There are many important discussions taking place regarding how performance monitoring works, and although security monitoring shares a lot of common themes, it also differs… Read More

MEHR LESEN
Blog

How Do Lacework Polygraphs© Remove Security Toil?

To gain an understanding of Polygraphs&#169, let’s first consider the differences between data and insights. Let’s imagine we have a user who likes… Read More

MEHR LESEN
Blog

Lacework für Azure- und Multicloud-Umgebungen: Eine Lösung für das Problem Cloud-Security

Lacework today announced security support for Microsoft Azure, which means two things: Our customers get threat detection of behavioral anomalies for cloud and… Read More

MEHR LESEN
Blog

What are the New Attack Vectors in AWS?

By 2021, Cisco expects 94 percent of workloads and compute instances to be processed by cloud data centers. Attackers are already starting to focus and targeting cloud accounts, moving away from traditional data centers. Read More

MEHR LESEN
Blog

AWS account Security: a great example to compare and contrast Lacework with CASB solutions

Lacework is a cloud security company, and we recently launched Lacework for AWS CloudTrail, a new solution focused on AWS account security. Securing a “cloud… Read More

MEHR LESEN
Blog

Polygraphs: Behavior Baselining to Reveal the Elephant

You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them… Read More

MEHR LESEN
Blog

Introduction to Polygraphs

In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap two of the fundamental characteristics any CWPP should have: Read More

MEHR LESEN
Blog

Lacework Coming Out Of Stealth!

An incredible milestone in a journey that started two years ago with a simple question: Why does it take enterprises 6+… Read More

MEHR LESEN