Search Results
Results For:
50 CISOs to watch
The role of CISO is one of the most important in any organization, and one that holds some of the most significant responsibilities: keeping… Read More
MEHR LESENShining a new light on security in the cloud era
Cloud computing is fundamentally transforming the way people interact with the world and how companies get business done. And while the cloud has allowed businesses… Read More
MEHR LESENWhat is the Difference Between Performance and Security Monitoring?
There are many important discussions taking place regarding how performance monitoring works, and although security monitoring shares a lot of common themes, it also differs… Read More
MEHR LESENHow Do Lacework Polygraphs© Remove Security Toil?
To gain an understanding of Polygraphs©, let’s first consider the differences between data and insights. Let’s imagine we have a user who likes… Read More
MEHR LESENLacework für Azure- und Multicloud-Umgebungen: Eine Lösung für das Problem Cloud-Security
Lacework today announced security support for Microsoft Azure, which means two things: Our customers get threat detection of behavioral anomalies for cloud and… Read More
MEHR LESENWhat are the New Attack Vectors in AWS?
By 2021, Cisco expects 94 percent of workloads and compute instances to be processed by cloud data centers. Attackers are already starting to focus and targeting cloud accounts, moving away from traditional data centers. Read More
MEHR LESENAWS account Security: a great example to compare and contrast Lacework with CASB solutions
Lacework is a cloud security company, and we recently launched Lacework for AWS CloudTrail, a new solution focused on AWS account security. Securing a “cloud… Read More
MEHR LESENPolygraphs: Behavior Baselining to Reveal the Elephant
You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them… Read More
MEHR LESENIntroduction to Polygraphs
In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap two of the fundamental characteristics any CWPP should have: Read More
MEHR LESENLacework Coming Out Of Stealth!
An incredible milestone in a journey that started two years ago with a simple question: Why does it take enterprises 6+… Read More
MEHR LESEN