What is threat detection and response?
The Polygraph journey
50 CISOs to watch
Go farther with Fargate: secure your containers with Lacework
‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why
Lacework named a Leader in G2 Winter Reports
CISO Series: Why cloud security is a different beast than on-premise
It’s time to scale up your cloud security posture
Know your enemy:
A look at 4 common attack paths
Manage Lacework with AWS CloudFormation and CDK
What is CSPM?
AndroxGh0st - the python malware exploiting your AWS keys
Lacework integrates with Amazon Security Lake to reduce complexity in your cloud
New AWS Account Factory Customizations automates AWS account onboarding into Lacework
The most effective CNAPP leverages agentless and agent-based security
Best of both for CSPM: Lacework & AWS Security Hub
Machines won’t replace threat hunters until they master this one skill
Lacework welcomes new Chief Financial Officer, Andrew Casey
Frost & Sullivan report names Lacework a CNAPP market leader
Lacework welcomes new Chief Marketing Officer Meagen Eisenberg
Why behavior-based threat detection is critical for cloud workload security
Priorisieren Sie die größten Risiken und verkürzen Sie die durchschnittliche Reaktionszeit mit Exposure Polygraphs
Lacework is once again named a Leader by G2
10 easy ways to learn about cybersecurity without being bored to tears
I tried to write about containers, but realized I needed to understand images, Docker, and Kubernetes first
Promoting cybersecurity awareness in your boardroom
What you need to know about the latest critical OpenSSL vulnerability
Achieving Kubernetes best practices with CIS Benchmark for Amazon EKS
We ignored the dangers of containers 30 years ago, and we're doing it
Taking a data-driven approach to a Zero Trust model
Don’t waste your time following these 3 password security rules
New Lacework Cloud Threat Report reveals stealthier adversaries are focusing on infrastructure
Threat detection and response tools are built on shaky foundations, leaving your cloud workloads at risk
Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think
Can your cloud security vendor help you level up?
Cloud security fundamentals for an informed buyer
Sind Sie bereit, uns in Aktion zu erleben?
Mit Lacework können Sie unbekannte Bedrohungen schneller aufspüren und kontinuierlich nach Anzeichen für Kompromittierungen suchen. Testen Sie Lacework, um sich selbst davon zu überzeugen.