Blog

Blog 25. Mai 2023
What is threat detection and response?

Blog 19. Mai 2023
The Polygraph journey

Blog 10. Mai 2023
50 CISOs to watch

Blog 6. Mai 2023
Go farther with Fargate: secure your containers with Lacework

Blog December 21, 2022
‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why

Blog December 19, 2022
Lacework named a Leader in G2 Winter Reports

Blog December 16, 2022
CISO Series: Why cloud security is a different beast than on-premise

Blog December 14, 2022
It’s time to scale up your cloud security posture

Blog December 13, 2022
Know your enemy:
Know your enemy:
A look at 4 common attack paths

Blog December 12, 2022
Manage Lacework with AWS CloudFormation and CDK

Blog December 7, 2022
What is CSPM?

Blog December 6, 2022
AndroxGh0st - the python malware exploiting your AWS keys

Blog 29. November 2022
Lacework integrates with Amazon Security Lake to reduce complexity in your cloud

Blog 28. November 2022
New AWS Account Factory Customizations automates AWS account onboarding into Lacework

Blog 28. November 2022
The most effective CNAPP leverages agentless and agent-based security

Blog 28. November 2022
Best of both for CSPM: Lacework & AWS Security Hub

Blog 22. November 2022
Machines won’t replace threat hunters until they master this one skill

Blog 17. November 2022
Lacework welcomes new Chief Financial Officer, Andrew Casey

Blog 16. November 2022
Frost & Sullivan report names Lacework a CNAPP market leader

Blog 14. November 2022
Lacework welcomes new Chief Marketing Officer Meagen Eisenberg

Blog 10. November 2022
Why behavior-based threat detection is critical for cloud workload security

Blog 9. November 2022
Priorisieren Sie die größten Risiken und verkürzen Sie die durchschnittliche Reaktionszeit mit Exposure Polygraphs

Blog 9. November 2022
Lacework is once again named a Leader by G2

Blog 7. November 2022
10 easy ways to learn about cybersecurity without being bored to tears

Blog 3. November 2022
I tried to write about containers, but realized I needed to understand images, Docker, and Kubernetes first

Blog 1. November 2022
Promoting cybersecurity awareness in your boardroom

October 28, 2022
What you need to know about the latest critical OpenSSL vulnerability

Blog October 25, 2022
Achieving Kubernetes best practices with CIS Benchmark for Amazon EKS

Blog October 24, 2022
We ignored the dangers of containers 30 years ago, and we're doing it

October 21, 2022
Taking a data-driven approach to a Zero Trust model

Blog October 18, 2022
Don’t waste your time following these 3 password security rules

Blog October 13, 2022
New Lacework Cloud Threat Report reveals stealthier adversaries are focusing on infrastructure

Blog October 6, 2022
Threat detection and response tools are built on shaky foundations, leaving your cloud workloads at risk

Blog October 4, 2022
Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think

Blog September 29, 2022
Can your cloud security vendor help you level up?

Blog September 27, 2022
Cloud security fundamentals for an informed buyer
Sind Sie bereit, uns in Aktion zu erleben?
Mit Lacework können Sie unbekannte Bedrohungen schneller aufspüren und kontinuierlich nach Anzeichen für Kompromittierungen suchen. Testen Sie Lacework, um sich selbst davon zu überzeugen.