Pages
Posts by category
Category: Blog
What is threat detection and response?
The Polygraph journey
50 CISOs to watch
Go farther with Fargate: secure your containers with Lacework
‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why
Lacework named a Leader in G2 Winter Reports
CISO Series: Why cloud security is a different beast than on-premise
It’s time to scale up your cloud security posture
Know your enemy: A look at 4 common attack paths
Manage Lacework with AWS CloudFormation and CDK
What is CSPM?
AndroxGh0st – the python malware exploiting your AWS keys
Lacework integrates with Amazon Security Lake to reduce complexity in your cloud
New AWS Account Factory Customizations automates AWS account onboarding into Lacework
The most effective CNAPP leverages agentless and agent-based security
Best of both for CSPM: Lacework & AWS Security Hub
Machines won’t replace threat hunters until they master this one skill
Lacework welcomes new Chief Financial Officer, Andrew Casey
Frost & Sullivan report names Lacework a CNAPP market leader
Lacework welcomes new Chief Marketing Officer Meagen Eisenberg
Why behavior-based threat detection is critical for cloud workload security
Priorisieren Sie die größten Risiken und verkürzen Sie die durchschnittliche Reaktionszeit mit Exposure Polygraphs
Lacework is once again named a Leader by G2
10 easy ways to learn about cybersecurity without being bored to tears
I tried to write about containers, but realized I needed to understand images, Docker, and Kubernetes first
Promoting cybersecurity awareness in your boardroom
What you need to know about the latest critical OpenSSL vulnerability
Achieving Kubernetes best practices with CIS Benchmark for Amazon EKS
We ignored the dangers of containers 30 years ago, and we’re doing it
Taking a data-driven approach to a Zero Trust model
Don’t waste your time following these 3 password security rules
New Lacework Cloud Threat Report reveals stealthier adversaries are focusing on infrastructure
Threat detection and response tools are built on shaky foundations, leaving your cloud workloads at risk
Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think
Can your cloud security vendor help you level up?
Cloud security fundamentals for an informed buyer
ESG shares takeaways on IaC security trends
Prioritizing your container image pipeline
How your cloud security practice can support teams working at wildly different maturity levels
Attackers want your identity and know exactly where to find it
The top challenge for your cloud security practice isn’t what you think
5 practical tips to lock up your Kubernetes security
Agentless workload scanning brings better visibility without new security risks
Critical infrastructure is more vulnerable than ever—your industry could be a prime target
How fintech companies can protect consumer trust, starting with the cloud
The top cloud security challenges in 2022
Recent trends in S3 targeting
The future of security means focusing on people
4 surprising things I learned about hackers at Black Hat
Knowing your cloud is knowing what’s normal…and what’s not
A short pause along the path to celebrate being on the Forbes Cloud 100
Time series model brings another dimension of analysis, uncovering cryptomining threats
Powerful Lacework alerting overhaul helps teams act faster, together
ESG reveals developer security priorities in new study
The one piece of advice that most AWS re:Inforce presenters agreed on
Sleeping through AWS Cloud compliance meetings? You are not alone
Lacework drives customer innovation with confidence on AWS
My hope for the AWS re:Inforce 2022 keynote
Will breakthrough security technology solve the next big art heist or make it worse?
How to guarantee your time is well spent at AWS re:Inforce
Identifying detection opportunities in cryptojacking attacks
The types of sessions at an AWS conference and why they matter
ISO 27001 update gives a cloud callout to help you build your security practice
How Watchdog smuggles malware into your network as uninteresting photos
Increasing multicloud visibility and enabling innovation, from gaming to healthtech
What is visibility and why it’s important to cloud security
Are cybercriminals lazy or brilliant for selling your passwords instead of using them?
Security is one pillar of building in the cloud, not the only one
Healthcare: Where cloud security can save lives
ClearPath report shows automation and good policy can help beleaguered security professionals
Kubernetes tools are helpful for your team and sadly, your attacker
Ransomware hits the cloud
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134
Four tips for attending RSA Conference 2022
Security Advisory: CVE-2022-26134 RCE in multiple Atlassian products
More flexibility and visibility with agentless coverage for workloads
Lacework expands workload security capabilities to protect Windows Server
New integration with Kubernetes admissions controller
Lacework Update
Embed IaC security at the earliest stage in development
Security Advisory: Critical vulnerabilities in VMware
Lacework stellt neue Kubernetes Audit Logs Monitoring vor
Lacework joins the CNBC Disruptor 50 List
Balancing small team demands with the need for cloud visibility
Lacework goes to FutureStack
Malware targeting latest F5 vulnerability
Lacework at Kubecon + CloudNativeCon Europe 2022
How developers can prevent bad actors
What Is cloud security?
Lacework CEOs and Presidio discuss cloud security
Cybersecurity and breach regulations – Are you ready?
Securing your supply chain
Introducing Container & Workload Security for AWS Fargate
Using machine learning to solve your business problems
NginxDay
Prevent cybersecurity burnout
Ten tips for building a vulnerability management pipeline
The OAST with the most
Actionable threat intel in the cloud
Neuer Bericht von Lacework zeigt die Zunahme ausgefeilter Cloud-Angriffe
Achieving SOC 2 compliance with Lacework
Heightened cyber threats have everyone on edge, what do you need to know?
Studie von Forrester Consulting zeigt, dass Lacework ein ROI von 342 % erzielt
Gaming and cloud security, don’t get played
Lacework named only security company in top-10 of Forbes’ Best Startup Employers
Die Rolle von Softwareentwicklern in der Cybersicherheit
Erweitern Sie Ihr Cloud-Sicherheitswissen dank Lacework Academy & Community
Celebrating International Women’s Day
A guide to responding to the Log4j vulnerability
Why visibility and permissions are key to Kubernetes security
Top 5 security incidents of 2021
Identifying active vs. dormant Log4j vulnerabilities
Lacework continues investment in partner ecosystem
Lacework Partners with Google Cloud
Shining a new light on security in the cloud era
Evaluate your cybersecurity posture for Data Privacy Day
Log4j heute – und was die Zukunft bereithält
What the Cloud? DevOps and DevSecOps Explained
Die Log4j-Schwachstelle: verhaltensbasierte Anomalie-Erkennung zur Identifizierung aktiver Angriffe
Das Modell der geteilten Verantwortung
Innovationen für unseren modernen Agenten
Unser Jahresrückblick: von Log4j bis hin zur Geschäftswelt von morgen
Bewältigung von Cyber-Sicherheits-Problemen wie Log4j – oder weniger bedeutenden Vorfällen
Log4j and Whatever Comes Next: Taking Care of Customers
Log4j-Angriffe – Eine Woche im Rückblick
Die Log4j-Schwachstelle: verhaltensbasierte Anomalie-Erkennung zur Identifizierung aktiver Angriffe
So reduzieren Sie Risiken durch die Log4j-Sicherheitslücke in Ihrer Umgebung
CVE-2021-43326: Ausweitung der Berechtigungen von Automox
Lacework Labs Identifies Log4J Attacks
What Does 2022 Hold For Your Cloud Security Practice?
Security-Prognosen des Lacework Labs für 2022
What AWS re:Invent 2021 Means For The Future of Cloud Computing
Introducing Lacework Academy, Our New Online Learning Platform
ABC Botnet Attacks on the Rise
Protect yourself for Cyber Monday
Security just as important for small businesses
Absicherung der geschäftlichen Zukunft von Unternehmen
Lacework partner, Observian, achieves AWS Level 1 MSSP Competency
Lacework acquires Soluble, increasing shift-left capabilities
Ein datenzentrierter Ansatz zur Absicherung der geschäftlichen Zukunft von Unternehmen
You Can’t Secure What You Can’t See
Securing the Cloud: Behavior is Better than Rules
Sand & Honey: Building Honeypots
Introducing Cloud Security Automation for Dummies
TeamTNT Continues to Target Exposed Docker API
Data Driven: Lacework and Snowflake Partner to Supercharge Security Operations
DIY Canary Tokens in AWS
“Spytech Necro” – Keksec’s Latest Python Malware
The New Cybersecurity Awareness: Data, Disinformation, and Security as a ‘Differentiator’
Mirai goes Stealth – TLS & IoT Malware
HCRootkit / Sutersu Linux Rootkit Analysis
CNAPP, CSPM, CWPP, C … Worin liegt der Unterschied und wie können diese Lösungen meine Cloud-Sicherheit verbessern?
PYSA Ransomware Gang adds Linux Support
Muhstik Takes Aim at Confluence CVE 2021-26084
Lacework 2021 Cloud Threat Report Vol. 2
Anwendungsfälle für moderne Container-Security
AWS re:Inforce 2021 Key Takeaways
Engineering A More Secure Cloud
Sichtbare Bedrohungen, die das Fehlen von Kubernetes-Audit-Richtlinien ausnutzen
Eine neue Hoffnung für kritische Infrastrukturen
Welcome Jay Parikh – The New Co-CEO of Lacework
Cloud-Security ist eine Frage von Daten
Top Ways Your Cloud Security Approach is Burning Cash
Threat Research with Snowflake & VirusTotal
Agentenbasierte vs. agentenlose Security: Was ist besser?
Hidden Bugs in The Mines: Examining Vulnerabilities within Cryptocurrency Miners
Absicherung Ihrer Infrastruktur durch Anomalie-Erkennung mit Polygraph von Lacework
Was ist Container Security?
SSH-Schlüssel zur Verfolgung von Bedrohungen – Pivoting von Bash Script Features
Hacken wie 1999 – Analysen automatisieren wie 2021
Keksec & Tsunami-Ryuk
Warum ich hier bin
Umfrage zur Cloud Security von ESG: Automatisierung und Vereinfachung sind in
Cloud-Zugang: Das neueste Angebot für Initial Access Broker
Die Komplexität der Cloud-Compliance knacken
Docker-Bilder von TeamTNT vom Netz nehmen
8220 Gang – Kürzliche Verwendung eines benutzerdefinierten Miners und Botnet
5 Schritte in der Cloud Security zum Aufdecken von Bedrohungen während einer M&A
Canary-Tokens und Ransomware-Operationen
5 Schritte zum Erreichen einer wirksamen Containersicherheit
Cpuminer & Friends
Sysrv-Hello Expands Infrastructure
Lacework Security for AWS Graviton2 ARM-based Infrastructure: Why It Matters
Lacework Achieves AWS Container Security Competency Status
Introducing Asset Discovery for AWS Environments
Sichere, automatisierte IaC-Bereitstellungen mit Terraform
Erweiterung der Security, Sichtbarkeit und Automatisierung in AWS-Umgebungen
Resolving Embedded Files at Runtime via strace
Carbine Loader Cryptojacking Campaign
Up and Running with Lacework Terraform Modules for AWS
The Cloud Security Evolution: From Point Products to Platforms
Das „Kek Security“-Netzwerk
AWS CloudTrail Best Practices, SIEM und Lacework
Startbereit mit dem Terraform-Provider für Lacework
Groundhog Botnet Rapidly Infecting Cloud
4 Fakten, die Sie über SOC 2 Compliance wissen sollten
A $525 Million Growth Round To Scale Lacework
TeamTNT Builds Botnet from Chinese Cloud Servers
Complete Cloud Visibility with Agent Based Security
Up and Running with Lacework and AWS Code Build (Update)
SolarWinds & the Software Supply Chain
Top 5 Ways Your Cloud Security Approach Is Burning Cash
Announcing Lacework on the Terraform Registry!
Top Tips for Navigating the Murky Waters of DevSecOps
Lacework Achieves Unparalleled Security through Exceptional Partner Relationships and Solutions
Meet Muhstik – IoT Botnet Infecting Cloud Servers
Moobot’s Cloud Migration
Up and Running with Lacework and Hashicorp Packer
The Redis Rush
Up and Running with the Lacework CLI
It’s Here: Lacework’s Active Host Vulnerability Monitoring
Up and Running with Lacework and Jenkins
What is the Difference Between Performance and Security Monitoring?
Doki Dukes with Kinsing
How Do Lacework Polygraphs© Remove Security Toil?
Introducing the Terraform Provider for Lacework
What Is Cloud Workload Protection?
Krieg der Bashes
An die Sicherheitsbranche: Wir müssen über Blocking und „Shift Left Security“ sprechen
Recon-Schwachstellen in Kubernetes: Eine eingehende Analyse zur Discovery in der Kubernetes Attack Matrix
Who’s Attacking My Containers?
H2Miner Botnet – Act 2
Lacework Priorities: Continued Safety and Security – A Commitment to our Customers and Employees
Research Automation with ATT&CK & Python
The Biggest Cloud Breaches of 2019 and How to Avoid them for 2020
Automating Enforcement and Response in 2020
CWPP Security 101
Secure DevOps with Datadog and Lacework
Ein umfassender Leitfaden zur Container-Security-Architektur
Cloud Wars & K8s Attacks: Speaking Engagements this November
AWS Security Best Practices for 2020 You Need to Implement
NIST Cybersecurity Framework and Your Cloud
PCI DSS Compliance Checklist and HIDS Requirements
DerbyCon 9.0 & BSides Denver ‘19
It’s Time for a New Generation of Security
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 2
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 2
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 1
Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly
Lacework Resolves the Container Security Gap
Developing a Security-First Model for Cloud Compliance
The Rise of DevOps and the Fall of Organizational Walls
Enforce Security Through Policy-as-Code
Cloud & Container Security: Three Great Talks and Tools from Black Hat 2019
Cloud Anomaly Detection and Vulnerability Assessment Needs to Yield Actionable Alerts
Developing a Cloud & Container Incident Response Plan
A Quick Guide to Container Orchestration Vulnerabilities
Verbessern nativer Kubernetes-Security
The Value of Enhancing Native AWS Security Tooling
Lacework Threat Detection in Cloud Environments: A Quick Guide
How Capital One Illustrates the Need for Cloud Configuration Visibility
Lacework Labs Upcoming Speaking Events
Cloud Security Incident Response: Continuous vs. Emergency Approaches
How to Improve Breach Detection in the Cloud
Cloud Compliance Security, Part 2: The Importance of Security Controls
Cloud Compliance Security, Part 1: Understanding Expectations & Building Requirements
Cryptojacking Malware Gets Creative with Variable Names
The Value of Enhancing Native AWS Security Tooling
Why Linux Servers Need Extra Security
Container Orchestration Demands a Security Focus
A Deep Dive Into Three Popular CVE-2019-3396 PoCs Used in Confluence Attacks
The Lacework Guide to AWS re:Inforce in Boston
The Shift is On: Why Lacework is Extending Security From Run Time to Build Time
Container Orchestration Demands the Right Security Approach
Cloud Controls to Major Tom: A Quick Guide to Configuration as a Security Measure
Lacework: Leading the Way From Product to Platforms
Without Security Visibility and Analysis, BlueKeep Keeps on Keeping On
Host Intrusion Detection for Compliance in AWS and Multicloud Environments
Misconfigured Servers Leave 2.3 Billion Private Files Exposed
Automatisierung ermöglicht Security für DevOps und Laufzeit
4 Ways Lacework Detects Confluence Attacks
The Benefits of a Host-Based IDS for Cloud Environments
Securing the Most Vulnerable: Medical Device and Patient Data Security is Critical
Wenn Sie sehen können, können Sie schützen: Anomalie-Erkennung in der Cloud
AWS Database With No Password Exposes 49 Million Instagram Accounts
An Unauthenticated RCE Gold Rush: A Look at Attacks Exploiting Confluence CVE-2019-3396
Effective Compliance Requires a Security-First Approach
Für die Abwehr von Workload-Bedrohungen ist Visibilität entscheidend
Easily Overlooked Container Security Risks
Citrix’ Undetected Hackers Are Why You Need Anomaly Detection
80 Million Personal Records Discovered on Open Microsoft Database
Rules and Best Practices Still Couldn’t Prevent the Docker Hub Breach
Do Data Leaks Have to Be So Common?
Silent But Deadly: Cloud Security and Cryptomining
Be Quick But Don’t Hurry: Container Security in Cloud Environments
Latest Hacks: Legal Docs Exposed Through Unprotected Elasticsearch Server
Top 10 Threats to Cloud Security: AWS Security Week New York
The Basics of Configuration Compliance
Latest Hacks: Microsoft’s Hotmail, MSN Compromised With User Credentials
Cryptojacking Campaign Targets Exposed Kubernetes Clusters
Why Process-to-Process Visibility Is So Important
Stratics Networks Robocaller Database Exposed on AWS
The New School of Security: Using the Cloud to Secure the Cloud
Facebook Exposes User Data Through Unprotected AWS S3 Buckets
File Integrity Monitoring: Using Lacework’s SaaS Solution for SaaS Environments
Cloud Security This Week – March 29, 2019
There Are a Lot of Ways to Get Cloud Security Wrong
Security Relevance Can’t Be Bought
Cloud Security This Week – March 22, 2019
Integrating DevOps and Security
Triaging a CryptoSink Infection in 5 Minutes with Lacework
The Cloud’s Unique Security Challenges
Anomaly Detection vs. Rules: Better Security Insights, Designed for the Modern Enterprise
Container Security: A Popular Topic at BSidesSF ‘19
Cloud Security This Week – March 1, 2019
Talking Kubernetes at Denver ISSA
For Those About To Rock RSA, Lacework Salutes You!
PCI Compliance in the Public Cloud
Cloud Security This Week – February 22, 2019
Lacework für Google Cloud: Sicherheit für Orchestrierung, Multicloud und Kubernetes
Lacework für Azure- und Multicloud-Umgebungen: Eine Lösung für das Problem Cloud-Security
Art Into Science: Conference Overview & Securing K8s
Your etcd is Showing: Thousands of Clusters Open to the Internet
Takeaways From my First Week at Lacework
ELF of the Month: New Lucky Ransomware Sample
The Unending Saga of Equifax Won’t Go Away. That’s Good News For Anyone Who’s Not Equifax.
5 Highlights From an Exceptional Year at Lacework
Cloud Security This Week – December 21, 2018
Is Your Cloud Giving or Receiving This Holiday Season?
My Mom is Sick and Tired of Your Weak S3 Bucket Policies
Kubernetes CVE-2018-1002105
Cloud Security This Week – December 14, 2018
Cloud Security This Week – November 30, 2018
ELF of the Month: Linux DDoS Malware Sample
Next Generation Firewall is Your Grandfather’s Generation in the Cloud
Securing Innovation in the Public Cloud
A Cybersecurity Three Pointer: How Basketball Explains Risk in the Cloud
Why Organizations Are Still Learning From the Uber Breach
Cloud Security This Week – October 26, 2018
Security Table Stakes: A Blueprint for Securing Your Cloud Environment
Cloud Security This Week – October 19, 2018
Redis Compromise: Lacework Detection
Anatomy of a Redis Exploit
Cloud Security This Week – October 12, 2018
The New Security Stack: While old school security vendors are trying to buy their way into relevance, it’s still not making organizations any safer
Cybersecurity is Everyone’s Business, All the Time
Cloud Security This Week – September 28, 2018
I Read the News Today, Oh Boy
This is How to Optimize CloudTrail to Improve the Security of Your AWS Environment
Privilege Escalation and a Proposal for Acceptable Exclusion
Lacework Supports PCI Compliance with FIM Solution
Kubernetes, Pizza, and Learning From Our Community
Using the Cloud to Secure the Cloud: Lacework and the New Era of Cloud Security
PCI Compliance for Cloud Environments: Tackle FIM and Other Requirements With a Host-Based Approach
I Just Looked at 2 Billion Cloud Events. Here’s What I Found.
Security Can’t Start Until Multi-Factor Authentication is Turned On
Lacework Named a 2018 Gartner Cool Vendor in Cloud Security and Recognized in Market Guide for CWPP
How Ronaldo’s Hair Explains Cybersecurity
Containers At-Risk: A Review of 21,000 Cloud Environments
Timing Security Market Transitions
Refocus on What Matters: Risks vs Threats
Containers in the Cloud: From Top Hazards to First-Class Cloud Security Citizen
Avoiding Holes in Your AWS S3 Buckets
GOING TO RSA? HERE’S YOUR PRE-SHOW CHECKLIST FOR AWS SECURITY
What are the New Attack Vectors in AWS?
Why Use a Host-Based IDS in AWS
Driving Towards Least Privilege in AWS: A Baker’s Dozen
Survey Highlights Top Four Trends in Cloud Security Adoption
Context is King: Building Bridges Between DevOps and Security, Part IV
Visibility: A Technical Chauffeur of Data, Part III
Building Bridges from Security to Development, Part II
5 Steps to Eliminate AWS Misconfigurations and Open S3 Buckets
Bridging the Gap Between Security and DevOps, Part I
AWS re:Invent Recap: Is This the end of the Enterprise Security Market?
The Breach: You Can’t Secure What You Can’t See
Why I joined Lacework: the opportunity to define a better approach to Securing the Cloud
One employee gets the blame at Equifax. Fair?
AWS account Security: a great example to compare and contrast Lacework with CASB solutions
Build the Foundation for Faster cloud compliance with cloud Visibility
Another Multi-Billion Dollar Cybersecurity Catastrophe at Equifax
Forrester’s Insights into Cloud Workload Security: Automate, Automate, Automate
More Machine Learning Models != Better Results
One of the Harshest Cybersecurity Regulations: Will NY DFS Part 500 of Title 23 Impact You?
Real-World AWS Account Compromises and How Lacework Stops Them
A Security Mindset Reset: Five Reasons Network Security Just Doesn’t Work in the Cloud
Polygraphs: Behavior Baselining to Reveal the Elephant
Introduction to Polygraphs
Smitten with containers? What about security?
Whack-a-Mole – Wanna Cry!!
Lacework Coming Out Of Stealth!
Security Challenges: Just a Handful
No Policies. No Rules. No Logs.
Category: Labs
In The News
Cloud-Security Startup Lacework Taps New CFO as It Weighs IPO
Lacework Names New Americas Channel Chief, CFO, CMO
Former MongoDB and TripActions CMO Meagen Eisenberg joins Lacework as Chief Marketing Officer
CNBC’s Top Startups for the Enterprise: Lacework
Google Cloud Gets Lacework’s CNAPP, Multi-Cloud Visibility
Google Cloud improves security, adds CNAPP integration with Lacework
Lacework Brings Its CNAPP Solution To Google Cloud's Chronicle Security Operations
Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report
Security Testing Improves Headaches & Compliance
Lacework rolls out Cloud Hunter tool
Low code doesn’t necessarily mean low security risks
New Lacework Cloud Hunter offers environmental analysis and improved response time
It's Time to Make Security an Innovation Enabler
Clariness selects Lacework to future-proof cloud security
Lacework 'unifying' under single CEO as David Hatfield steps down
Lacework implements security control for Avenue Bank platform
CNAPP buyers guide: Top tools compared
Cloud cybersecurity necessitates automation
September is National Insider Threat Awareness Month - Experts Weigh In
Lacework Named To The Forbes Cloud 100
Lacework Named To The Forbes Cloud 100
What one piece of advice would you offer to a CIO if you were talking to them right now? (print edition, p32-25)
Why Software Shifted Left
How Developers Can Thwart Bad Actors
Enemybot: a new Mirai, Gafgyt hybrid botnet joins the scene
What We Can Learn From Lapsus$ Techniques
New research: Australian and New Zealand organisations move towards DevSecOps
ANZ Organisations Moving Toward DevSecOps
More ANZ organisations warm to DevSecOps
Cloud threat actors hone in on vulnerabilities, report finds
Lacework Labs Cloud Threat Report identifies most exploited vulnerabilities
Intelligent CIO asks Graham Pearson of Lacework - What one piece of advice would you offer to a CIO if you were talking to them right now?
Brian Lanigan is Lacework’s new VP of Worldwide Channels and Alliances
Lacework Hires New Partner Leader, Building on Recent Partner Momentum
Lacework hires new partner leader to build on recent channel momentum
Lacework Hires Splunk Vet to Lead Worldwide Channels, Alliances
Lacework holt sich Brian Lanigan von Splunk als Global Channel Chief
Lacework builds threat detection with Morpheus AI security framework
Lacework's Graham Pearson: 'I want to build the company everyone wants to work for'
Treffen Sie Amerikas beste Startup-Arbeitgeber 2022
Dynamic Business features Danielle Dungo, Senior Manager, Strategy & Sales Operations, Lacework
Lacework Fills Need for Runtime Security
10 experts redefining recruiting and retaining talent in tech
Lacework Co-CEO Jay Parikh spricht über den komplexen Arbeitsmarkt
Cybersecurity Market Sets Records for Venture Capital in 2021, Expected To Keep Rolling Through 2022
High Profile Attacks Make Security a Board-level Topic - Lacework VP and general manager EMEA, Jesper Frederiksen
Themes From Momentum Cyber’s 2022 Cybersecurity Almanac
Das Cloud-Sicherheitsunternehmen Lacework wirbt in einer zweiten Finanzierungsrunde der Serie D eine Rekordsumme von 1,3 Mrd. USD ein
Cloud Security Provider Lacework Closed a $1.3 billion Round
Lacework Scored $1.3 Billion in Series D Funding Round
Lacework Platform secures Kubernetes environments
2021 Record Year for Cybersecurity M&A, Financing: Report
2021 was a record-breaking year for cybersecurity startups
Lacework unveils enhanced Polygraph multi-cloud security platform
Lacework Enhances Channel Program To Support Partners’ Go-To-Market Motions
5 Companies That Came To Win This Week Feb 4
Lacework Introduces Polygraph® Data Platform
Lacework launches tiered partner program
Lacework Launches Enhanced Partner Program For Cloud Security Growth
Lacework Introduces Polygraph Data Platform
Lacework expands capabilities for fixing Log4j flaw
New Lacework platform helps companies uncover suspicious activity in the multicloud
Lacework Plunges Polygraph Into Multi-Cloud, Prioritizes Log4j Remediation
Why Security Pros Are Frustrated With Cloud Security
Lacework Partners with Google on Cloud Security and Announces Investment from GV
the Cyberwire - Daily Briefing
Lacework Unveils Tiered Partner Program To Aid Channel Sales
5 Channel Partner Program and MSP News Updates
Lacework Enhances Partner Program
Cloud security unicorn Lacework secures funding from Google
Over half of time spent on security issues is wasted
Lacework stellt Facebook VP of Engineering ein, um die Cloud-Security-Plattform voranzutreiben
Ihr vollständiger Leitfaden zum AWS Startup Showcase, präsentiert von theCUBE
Flashpoint acquires Risk Based Security. iProov raises $70 million. Signal's CEO steps down, naming Brian Acton as interim CEO.
Security-Technologie: Aufstieg zur Cyber-Challenge
Largest venture capital deals in the Bay Area in 2021
SoftBank, Tiger Still Lead Pack Of Spendiest Startup Investors In The World
Cybersecurity Venture Funding Surpasses $20B In 2021, Fourth Quarter Smashes Record
Jesper Frederiksen joins Lacework as General Manager for EMEA
Lacework Welcomes Jesper Frederiksen As General Manager For EMEA
5 Cybersecurity IPOs We Expect in 2022
6 Cybersecurity Facts We Learned in 2021
The Year’s 10 Biggest VC Funding Rounds: Cruise, Rivian And Lots Of Billion-Dollar Deals
6 things in cybersecurity we didn’t know last year
From a CEO Revolving Door to Comparisons With Snowflake: Security Startup Lacework Bounces Back
Kubernetes security will have a breakout year in 2022
Lacework Cloud Care helps security teams uncover Log4j vulnerability
Lacework Introduces New Free Cloud Care Program to Aid in Industry Fight Against Log4j
What the Log4Shell Bug Means for SMBs: Experts Weigh In
Log4Shell Is Spawning Even Nastier Mutations
Cloud application developers need built-in security
Databricks, a $38 Billion Startup, Creates Its Own Venture Fund
Money Moves: November 2021
Companies Respond to Log4Shell Vulnerability as Attacks Rise
Overcome the security talent shortage by addressing your tech stack
15 Experts Share 2022 Security Predictions
Will DevSecOps Finally Take Off?
Cybersecurity M&A Roundup: 40 Deals Announced in November 2021
Lacework lève 1,3 milliard de dollars
Lacework Raises $8.3 Billion in Growth Funding
Investors Cash in as Users Fight a Perpetual Cyber War
Lacework Raises $1.3B On $8.3B Valuation To Expand Channel
Cloud security company Lacework draws $8.3 billion valuation in private funding round
Cloud security unicorn Lacework lands record-busting $1.3B funding round
Lacework lands $1.3B to expand its cloud cybersecurity platform
Cloud security startup Lacework valued at $8.3 bln after mammoth funding round
Investor Group Pledges $1.3 Billion to Data-Security Platform Lacework
Cloud wars: Four tech giants vow to take the military into the cloud
Cloud security vendor Lacework expands into A/NZ
Cloud security vendor Lacework expands into A/NZ
Lacework expands into Australia and New Zealand, plans for growth
Les attaques par ransomware évoluent vers les environnements Linux et Cloud
DevOps et SecOps doivent collaborer pour mieux innover dans le cloud
Migration vers le cloud : le chemin le plus rapide n'est bien souvent pas le plus sécurisé
Cyberkriminelle nehmen Cloud-Konten ins Visier
Monitoring vs. observability: What's the difference in DevOps?
Cloud Security Woes Give Rise to Integrated CNAP Platforms
Jay Parikh Tells Us About Why He Made The Move
Co-CEO at Lacework – Jay Parikh
Pysa ransomware gang targets linux
PYSA Ransomware Gang
PYSA Ransomware Gang nimmt Linux ins Fadenkreuz
Bereiten Sie sich auf PYSA Ransomware-Angriffe vor
New ChaChi malware variant designed to target Linux systems
Le FIC 2021 ouvre ses portes mardi matin
Comment protéger les charges de travail dans le cloud ?
Sécuriser les plateformes “modernes” de bout en bout
Le passage au cloud ouvre des perspectives aux cybercriminels, pour voler des données et obtenir un accès illicite au réseau
Cloud Security Innovator Lacework Expands in EMEA
The Wheelbarrow Effect: Cloud Security Under Pressure
Jay Parikh Rejoint Lacework Au Poste De Co-CEO
Jay Parikh joins as Co-CEO
Spécialiste de la sécurité pour le cloud, Lacework confirme donc que Jay Parikh a intégré la société au poste de co-CEO.
Talent Tracker: ECI Media Management, Lacework, Publicis Sapient and more
Jay Parikh et David Hatfield travailleront ensemble en tant que co-CEO pour développer Lacework
Jay Parikh, Former Facebook VP Joins as Co-CEO
Collaboration is Key for Cloud Innovation
As Cyberattacks Surge, Security Start-Ups Reap the Rewards
Herausforderung Container-Sicherheit: Komplexität beherrschen durch Machine Learning
Lacework mise sur la France pour son expansion européenne
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Funkshau-Lacework kündigt Expansion in EMEA an
Lacework Announces Global Business Expansion Into EMEA Region
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework annonce son expansion dans la région EMEA
Lacework looks for channel support in EMEA expansion
Revolutionary cloud security company Lacework announces EMEA expansion
Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework étend ses activités dans la région EMEA
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework, L’entreprise De Sécurité Du Cloud Révolutionnaire, Annonce Son Expansion Dans La Région EMEA
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework scales up automated security across cloud workloads and containers
The 10 Hottest Cloud Security Startups Of 2021 (So Far)
Can Cloud Automation Solve Security Analyst Fatigue?
Endpoint security platform raises $40M
The Importance of Security Adapting To Help DevOps. CUBE Clip from RSAC 2021
Keksec Cybergang Debuts Simps Botnet for Gaming DDoS
Chaos testing and other automation tools could help cybersecurity move forward
Why your online assets aren’t safe: Is cloud the problem or the solution?
Lacework CEO spills the secret formula for successful market disruption
Top 20 Fastest Growing Cybersecurity Companies in Q1 2021
The Evolution of DevSecOps
Opportunities for DevSecOps in 2021
How Lacework Built Their Account-Based Strategy and Doubled Their Pipeline with Demandbase
Mark Ninnikhoven of Lacework speaks on the importance of security helping rather than hindering work in a DevSecOps world
10 Emerging Cybersecurity Trends To Watch In 2021
HealthTech Magazines Highlights Lacework
The 20 Coolest Cloud Security Vendors Of The 2021 Cloud 100
Lacework Lands $525M Investment as Revenue Grows 300%
Lacework Closes a $525 Million Growth Round to Scale Up Infrastructure Security for the Cloud Generation
Lacework Scores $525M in Security Battle Against Palo Alto Networks
Cloud Security Firm Lacework Raises $525 Million in VC Round
Cloud Security Provider Lacework Raises Massive $525M Growth Round
Lacework Raises $525 Million to Automate Cloud Security and Compliance
The Shared Irresponsibility Model in the Cloud Is Putting You at Risk
How These 4 Bay Area SaaS Companies Are Taking Over Enterprise Operations
Cloud Security Firm Lacework Launches New Continuous Host Vulnerability Monitoring
Cloud Security Is Not A Patchwork; How Lacework Approaches Security Differently
Lacework Adds Active Host Vulnerability Monitoring, CI/CD Integrations
Speed in Cloud Native Requires Rethinking Security
DevSecOps-Prognosen 2020
6 Security Team Goals for DevSecOps in 2020
Cybersecurity Takes the Stage
VMblog Interview with Lacework at KubeCon - Platform Approach to Security
DevOps Chats: Cloud-Native Apps & Security With Lacework
Lacework, Datadog Partner on Cloud, Container Security
Lacework Adds Datadog Integration to Boost Cloud Security Monitoring
Why You Should Shift Your Cloud Security Strategy Up Stack
Lacework Integrates with Datadog to Bring Security Visibility to Cloud Monitoring
Making the Shift for a Complete Security Approach
The New Generation of Cloud Security Solutions for Enterprise DevOps Teams is Here
Primer: What Is Container Security?
Lacework 2020 Predictions: Automating Enforcement and Response in 2020
Lacework Creates Solutions for the DevOps Culture Without Leaving Security Behind
Leaky Autoclerk Database Exposes Info on Travelers
Worm Hits Docker Containers
Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS
Graboid the First Worm to be Found Hiding in Docker Hub Images
Leaving Behind Old School Security Tendencies
10 coole Startups, die im September 2019 Risikokapital aufgenommen haben
KubeCon 2019 Q&A: Lacework to Showcase Comprehensive Platform Approach to Security for Modern Environments at Booth S105
BSIMM 10: DevOps is Changing How Software Teams Approach Security
How Do You Adapt Security When You Move to the Cloud?
Container Security War Heats Up With $42M Lacework Investment
Cloud Security Firm Lacework Raises $42 Million
Lacework Raises $42 Million to Protect Cloud Environments From Data Breaches
Lacework Unveils New Generation Security with $42M in Funding
Cloud Security Firm Lacework Raises $42M
Lacework Secures $42 Million in Funding Round to Forge Ahead with ‘Snowflake for Security’ Plan
Coping With Security Risks, Compliance Issues Spun up by Digital Transformation
5 Limitations of Network-Centric Security in the Cloud
The 11 Top Enterprise Threat Intelligence Platforms of 2019
Moving on Up: Ready for Your Apps to Live in the Cloud?
Emerging Security Vendors To Know In 2019
Lacework: Easy-Bake Security for the Cloud-Native Developer
Top Cloud Compliance Software Tools
Dan Hubbard, Lacework CEO, on Cloud Security, Cybersec Threats, and AI in Security
An Add-On by Lacework for Sheer Security
There’s a Security Incident in the Cloud: Who’s Responsible?
What’s The Future of Cybersecurity? 38 Experts Share Their Insights
CEO Dan Hubbard of Lacework speaks on the promise he sees in Kubernetes
Shift Left for DevOps Security w/ Lacework's Dan Hubbard
Shift Left for DevOps Security with Lacework's Dan Hubbard
Lacework Announces Platform to Secure Development and Runtime Environments
Lacework Announces Complete Security Platform
Reduce Security Complexity for Cloud Architectures
Docker Hub Hack Affects 190K Accounts
8 Top Cloud Security Solutions
AWS S3 Buckets Exposed Millions of Facebook Records
Next Generation Firewalls are Old News in the Cloud
Kubernetes, Docker, ContainerD Impacted by RunC Container Runtime Bug
AWS Issues Alert for Multiple Container Systems
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Everything You Need to Know About Kubernetes
2019 DevSecOps Predictions
7 Enterprise Tech Startups to Watch in 2019
Shadow IT, IaaS & the Security Imperative
The Top 6 Cloud Security Vendors to Watch in 2019
Kubernetes Security: 4 Tips to Manage Risks
Farewell 2018, Hello 2019: The Last 12 Months in Cloud – and What’s on the Horizon
Cloud Backup: How It Can Protect Against Ransomware
Kubernetes Security Flaw Expected, Won’t Be the Last
New (and Much Needed) Emphasis on Container Security in 2019
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Cybersecurity Predictions for 2019
AWS Spot Instance and Cloud Security
Cloud, Compliance & the Death of the IT Checklist
Lacework Targets VARs, MSPs, Integrators with Global Partner Program
Lacework Introduces Global Channel Partner Program
How to Avoid Security Fails in the Public Cloud
Using the Cloud to Secure the Cloud: Moving From a Network-Centric to a Cloud-First Approach
6 Ways to Use CloudTrail to Improve AWS Security
Lightly Secured Cloud, With a Chance of IoT Attacks
Verizon Study Finds PCI DSS Compliance Falls Worldwide
Unsecured Veeam Database Reportedly Exposed Millions of Records
Veeam MongoDB Left Unsecured, 440 Million Records Exposed
Equifax Breach Still Fuzzy in the Rear-View Mirror
Container Security: From Development to Runtime
The Funded: Nearly $900M raised in Bay Area in 12 midweek deals
Lacework Raised $24 Million in Series B Funding
Lacework Raises $24 Million to Expand Cloud Security Business
Lacework Snags $24 M Series B in Sutter Hill-Led Round
Lacework Raises $24M in Funding to Improve Cloud Security
Lacework Raises $24 Million for AI-Based Cloud Security Platform
Lacework Closes $24 Million Series B Financing with Sutter Hill Ventures
Cloud Security Company Lacework Closes $24M Series B
Lacework Raises New Funds To Help Extend Cloud Security Capabilities
Lacework Obtains $24 Million in Latest Round of Financing
Lacework Raises $24 Million to Expand Cloud Security Business
Voting Security: Suggestions to Protect Our Elections
Why Container Orchestration Platforms Risk Data Exposure
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Hacking Elections: Georgia's Midterm Electronic Voting in the Dock
Congressional Campaign Websites Vulnerable to Attack, Say Researchers
Container Security Tools Pump up the Platform
Security Incident at Reddit Exposed User Data to Hackers
Spectre: The Vulnerability That Just Keeps on Giving
NetSpectre Attack Could Enable Remote CPU Exploitation
Lacework’s Three Keys for Effective AWS Security
A Dash of Security: Locking Down Kubernetes Admin Access to Thwart Crytojacking
The Weight of GDPR, Widespread Retail Breaches, Cloud Worries, More Venture Investment
IT Trends for the Remainder of 2018
Over 20,000 Container Management Dashboards Are Exposed on the Internet
Container Orchestration Systems at Risk by Being Web-Accessible
Lacework Warns of Unsecured Container Orchestration Dashboards
Lacework Finds Thousands of Vulnerable Kubernetes Deployments
Researchers Find 21,000 Exposed Container Orchestration Systems
Risks of Operating Workloads in the Cloud
Exposed Container Orchestration Systems Putting Many Orgs at Risk
Early Container Deployments at Risk, Survey Finds
Lacework Study Highlights Software Container Vulnerabilities
Lacework Study Finds 300 Unsecured Container Orchestration Dashboards
Kubernetes Skills Demand Continues to Soar – But are Organisations Dropping the Ball on Security?
Inside the Legislative and Regulatory Minefield Confronting Cybersecurity Researchers
Top 10 Cybersecurity Tips to Secure the 2018 U.S. Election
Martech Spending in 2018: What CIOs Need to Know
Operation Prowli Malware Infected 40,000 Machines
Lacework: Avant-Garde Security
More Data Leaked from AWS Bucket Misconfigurations
The Top Tools to Support DevSecOps
Moving to the Cloud: Too Many Companies, Too Fast?
Lacework Automates Veeva Systems Security and Compliance for its AWS Cloud
The 5 Gartner Cool Vendors in Cloud Security
Top 3 AWS Configuration Must-Dos for DevSecOps
A Guide: How to Apply the NIST Cybersecurity Framework to AWS Implementations
Best Security Software: How 9 Cutting-Edge Tools Tackle Today's Threats
Containers in the Cloud: From Top Hazards to First-Class Cloud Security Citizen
20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA
Avoiding Holes in Your AWS Buckets
The Malicious Use of Artificial Intelligence in Cybersecurity
Lacework Polygraph Prevents Bitcoin Mining on AWS
New Attack Vectors Brought by the Cloud and AWS
Balancing Velocity and Security in the Cloud
2018 Security Predictions
Best Security Software: How 5 Cutting-Edge Tools Tackle Today’s Threats
Security vs. Speed: The Risk of Rushing to the Cloud
The Importance of Getting Security On-Board Early in Cloud Projects
Innovative Organizations Build Security Into Their Cloud Strategy
Best security software: How cutting-edge tools tackle today's threats
Key Questions any CEO Should ask Before Moving to the Cloud
Major Intel CPU Flaw OS-Independent; Fix Could Degrade Performance
Confronting Cloud Security Challenges in 2018
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
2018 Security Predictions
InfoSec Professionals Reveal the Top Information Security Concerns for 2018 & Beyond
Spotting Attackers Early Means Being More Protected
5 Free Cyber Security Tools You Should Know
Is Fake News Dangerous? Security Pros Say Yes
Lacework Enhances Data Protection Capabilities to Enable AWS Users to Identify S3 Buckets at Risk
Lacework Can Now Identify Leaky S3 Buckets
Top Security Tools, 2017: How Cutting-Edge Products Fare Against the Latest Threats
6 Hard Truths IT Must Learn to Accept
Hybrid IT and Cybersecurity Drive Disruption at VMworld
Pressemitteilungen
Niels Provos Joins Lacework as Head of Security Efficacy
Lacework Helps Customers Achieve Greater Security Visibility with Amazon Security Lake
Lacework Appoints Andrew Casey as Chief Financial Officer
Lacework Recognized by Frost & Sullivan as Leader in Innovation and Growth for Cloud-Native Application Protection Platform (CNAPP)
Former MongoDB and TripActions CMO Meagen Eisenberg joins Lacework as Chief Marketing Officer
Lacework étend les capacités CNAPP avec l'analyse des canaux d'attaque et l'analyse des workloads sans agent
Lacework Extends CNAPP Capabilities with Attack Path Analysis and Agentless Workload Scanning
Lacework Named to CNBC’s 2022 Top Startups for the Enterprise
Lacework Brings Its CNAPP Solution To Google Cloud’s Chronicle Security Operations
Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report
Clariness Selects Lacework to Future Proof Cloud Security
Lacework and Avenue Bank partner to build cutting edge cloud foundation for launch
Lacework Named To The Forbes Cloud 100
Lacework Strengthens Threat Detection To Uncover More Malicious Activity and Speed Investigation at Scale
Lacework Helps Customers Innovate with Confidence On AWS
Lacework Announces Expanded Workload Security To Cover More Environments, Including Support for Windows Servers
Lacework Adds New Agentless Scanning to Uncover Vulnerability Risks in Cloud-Native Workloads
Lacework integriert Kubernetes-Funktionen, um die Sicherheit in Multi-Cloud-Umgebungen zu verbessern
Lacework Named to the 2022 CNBC Disruptor 50 List
Lacework Labs Cloud Threat Report Identifies Most Exploited Vulnerabilities Targeting Businesses In the Cloud
Lacework Announces Support for AWS for Games
Lacework Hires New Partner Leader, Building on Recent Partner Momentum
Lacework Ranked #6 on Forbes America’s Best Startup Employers List
Lacework Partners with Google on Cloud Security and Announces Investment from GV
Lacework Enhances Partner Program to Better Enable Cloud Service Providers, Alliance Partners and the Channel
Lacework Introduces Polygraph® Data Platform
Lacework Welcomes Jesper Frederiksen as General Manager for EMEA
Lacework Introduces New Free Cloud Care Program to Aid in Industry Fight Against Log4j
Lacework Raises $1.3 Billion at $8.3 Billion Valuation
Lacework Strengthens Data-Driven Cloud Security Platform with Acquisition of Infrastructure as Code Company Soluble
Lacework geht Partnerschaft mit Snowflake ein, um bessere Cloud-Security-Analysen und -Erkenntnisse zu ermöglichen
Lacework® expands into ANZ market to empower security and developer teams with a simpler, smarter cloud security platform
Lacework Customer Momentum Soars Globally as Attackers Continue to Target Cloud Environments
Lacework Quarterly Cloud Threat Report Shows the Automated Techniques Cybercriminals are Using to Attack Businesses in the Cloud
Jay Parikh, Former Facebook VP, Head of Engineering and Infrastructure, Joins Lacework as Co-CEO
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework, l’entreprise de sécurité du cloud révolutionnaire, annonce son expansion dans la région EMEA
Lacework Announces Continued Explosive Growth
Lacework Expands Security, Visibility and Automation Across Amazon Web Services
Lacework Expands Leadership Team with Key New Hires, Including David “Hat” Hatfield as Chief Executive Officer
Lacework Announces Mike Staiger as CFO
Lacework Closes a $525 Million Growth Round to Scale Up Infrastructure Security for the Cloud Generation
Lacework Helps to Support the Launch of Professional Services in AWS Marketplace
Lacework Expands “Accelerate” Partner Program for Cloud Generation of Technology and Services Partners Building Secure Software Businesses
Lacework Adds Active Host Vulnerability Monitoring and CI/CD Integrations as Demand for Unified SaaS Cloud Security Solution Surges
Lacework Integrates with Datadog
Lacework Closes $42 Million Financing Round and Adds Cloud Security Leader Andy Byron as President
Lacework Announces Complete Security Platform to Secure Development and Runtime Environments
Security Industry Veteran Dan Hubbard Named CEO of Lacework
Lacework Extends Multicloud Support with Workload and Account Security for Google Cloud Platform
Lacework Announces Comprehensive Security Support for Azure and Multicloud Environments
Lacework Names Johnny Chen as Vice President of Engineering
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Lacework Achieves AWS Security Competency Status
Lacework Introduces Global Channel Partner Program
Lacework Achieves SOC 2 Type II Compliance
Lacework Closes $24 Million Series B Financing With Sutter Hill Ventures to Expand Go-to-Market for Game-Changing Cloud Security Solution
Lacework Selected by Brightcove for Automation of Security at Scale for Its AWS-Hosted Video Service
Lacework Helps Veeva Systems Automate Security and Compliance for its AWS Cloud
Lacework Named a Gartner Cool Vendor in Cloud Security for 2018
New Cloud Operating Model Fuels Adoption of Lacework Automated Security and Compliance Solution
David Hatfield Joins Lacework’s Board of Directors
Hurwitz & Associates: Leaders Find Winning Cloud Security Strategy in Automation
Lacework Announces New Capabilities Enabling AWS Customers to Rapidly Implement Security Best Practices and Proactively Identify S3 Buckets at Risk
Lacework Names Dan Hubbard Chief Security Architect
Lacework Names Stefan Dyckerhoff Chief Executive Officer
Lacework Adds File Integrity Monitoring to its Cloud Security Platform
Lacework Recognized in Independent Cloud Workload Security Solutions Vendor Landscape Report
Lacework Brings Zero-Touch Anomaly Detection to AWS Accounts
Lacework’s Partnerships and Integrations Establish Foundation of New Cloud Security Stack
Lacework Executives to Present at CyberSecurity International Symposium and SANSFIRE 2017
Lacework Announces 14–Day Free Trial of Zero-Touch Cloud Workload Protection Platform (CWPP)
Lacework Selected to 2017 Red Herring Top 100 North America
Lacework Adoption Spikes, Protects More Than 50,000 Instance-Hours Per Day in First Month on the Market
Lacework to Showcase Industry’s First Zero-Touch Cloud Workload Security Platform at Gartner Security & Risk Management Summit
Lacework Launches with the Industry’s First Zero-Touch Cloud Workload Security Platform
RESSOURCEN
Learn how to build custom policies
Cloud security posture management (CSPM)
Inside Lacework: Agentless Workload Scanning
Lacework Product Leader Explains Attack Path Analysis with Exposure Polygraph
Inside Lacework: Attack Path Analysis with Exposure Polygraph
Broaden vulnerability coverage Lacework Agentless Workload Scanning
Speed investigations with Lacework Attack Path Analysis
Attack path analysis
Frost Radar™: Global CNAPP, 2022
Kubernetes in the Enterprise: Container Management Reimagined
Built for the cloud: automated, comprehensive compliance and security
Shifting security left to scale security for modern software development
Cryptojacking 101: What it is, why it matters, and how to respond
The evolution of cloud threats and defenses
Cloud Threat Report, Vol. 4
Fixing Vulnerabilities
Vulnerability management for startups and small businesses
IDC Tech Assessment: Vendor Assessments are Key to Unlocking Cloud Security Benefits
Avenue Bank builds a business — and a security discipline — from the ground up
Why Lacework for FinTech
Detect and expose cyber threats: A fireside chat with Eric O'Neill
Geo-analytics firm Kayrros uses Polygraph to protect the most precious of data
The Rise of Containers: Tackling the Security Challenge
Enhancing security for Sleepme’s IoT platform with Defiance Digital
Cryptojacking 101
Ein Balanceakt: GitOps und Shift Left Security
5 ways fintech security teams can protect digital trust
Built for the cloud: automated compliance and security for startups and small businesses
Simple cloud compliance for startups and small businesses
Clariness uses Lacework to gain the visibility needed to drive action and streamline compliance
Dreem gains insight into infrastructure and protects customer health data
Swimlane transforms compliance processes and vulnerability management with actionable insights
LendingTree
How to reduce security risks in the cloud
Forrester Research: Best Practices: Kubernetes
Securing data means securing lives
Greenlight Guru optimizes its regulatory compliance on AWS with Lacework
Preventing and Recovering from Ransomware Before It's Too Late
Lacework data collection: an agent approach
Agentless workload scanning
Getting Started with IaC
A Closer Look at the Lacework Polygraph® Data Platform
Container Security Toolkit
Geführte Tour zur Automatisierung der SOC-2-Compliance
Achieving HIPAA compliance
Protect Your Cloud Environment from Ransomware
10 bewährte Sicherheitspraktiken für Kubernetes
Achieving NIST SP 800-190 compliance
Comprehensive and automated Kubernetes security and compliance
TEI Spotlight shows 342% ROI with Lacework cloud security
The benefits of anomaly detection for the cloud
Protegrity verbessert die Compliance und gewinnt Einblick in Multicloud-Umgebungen
Cloud Threat Report, Band 3
Clariness restrukturiert die IT-Security-Compliance
Automated, Comprehensive Compliance and Security
Simplifying security for multicloud and hybrid environment
Leitfaden zur Container Security
Forrester Research: The State of Ransomware Attacks and Defenses
Lacework Field CTO Nicholas St. Pierre on the Security Architecture Podcast
Increasing visibility and automating security for ActivePipe
So bekämpfen Sie Ransomware in der Cloud
Infrastructure as Code (IaC) security
Nutzen Sie die Macht der Daten, um die Cloud-Sicherheit zu automatisieren
Achieving PCI DSS Compliance
Optimize Your Cloud Strategy
Cloud Threat Report, Vol. 3
Führende Sicherheitsbedrohungen und Trends in der Cloud 2022
Secure Your Gaming Development Pipeline with Lacework and AWS
With Lacework, Snowplow secures their multicloud environments and protects against Log4j
Buyer's Guide for cloud security platforms
Pocket Gems schützt Kundendaten und verbessert die Erkennung von Schwachstellen
Agentless und Agenten: Schützen Sie Ihre Cloud mit einer mehrschichtigen Strategie
Schwachstellenmanagement für Cloud Computing
Maximize Your Cloud Security ROI in 2022 Featuring Forrester's Total Economic Impact™ of Lacework
Game on: Don’t play around with cloud security
Charting The Course for Cybersecurity
Simplify AWS security for small businesses
Infographic: The Total Economic Impact™ of Lacework
Einführung von DevSecOps in Australien und Neuseeland
Anomaly Based Cloud Threat Detection
11 Reasons to Level up Against Cyber Threats
Sliide verwaltet Schwachstellen weist Compliance nach
Hello CNAPP: Merging CSPM and CWPP
Cloud security automation & compliance for hypergrowth startups
Polygraph® Data Platform: Proaktive Sicherung von Cloud-Umgebungen in großem Maßstab
Gartner® Predicts 2022: Consolidated Security Platforms Are the Future
Ausblick zum Thema Cloud-Security 2022, Band 1
Achieving SOC 2 compliance with Lacework
Die datenorientierte Security- Plattform trifft auf die Daten-Cloud
Die geballte Leistungskraft von Lacework und New Relic
Achieving ISO 27001:2022 Compliance
Vereinfachung der Sicherheit für Google Cloud
Vereinfachung der Sicherheit für Microsoft Azure
Vereinfachung der Sicherheit für AWS
AWS Control Tower Solution Brief
AB Tasty nutzt Lacework, um Compliance zu gewährleisten, Transparenz zu schaffen und Sicherheit in die Entwicklung zu integrieren
Molecular Health erreicht dank Lacework umfassende Transparenz in Bezug auf seine Infrastruktur und Umgebung
Five Ways to Optimize Your SIEM with Lacework
Forrester Consulting Total Economic Impact™
Scurri verdoppelt die Produktivität seines Security-Teams und gewinnt Unternehmenskunden durch nachweisliche Compliance
Ein Leitfaden zur Reaktion auf die Log4j-Schwachstelle
Die Log4j-Schwachstelle unter der Lupe
Sicherheit als oberstes Gebot: Compliance-Erwägungen für Cloud-Umgebungen
Nylas implementiert in kurzer Zeit Schutzmaßnahmen gegen die Log4j-Vulnerability
Compliance von Konfigurationen: Transparenz- und Compliance-Analyse für Multicloud-Umgebungen
Identifizieren und Bewältigen von Fehlkonfigurationen in AWS, Azure und GCP
Snowflake
HP Enterprise
Der fundamentale Wandel in der Cloud-Sicherheit
Die Zukunft der Cloud-Security
Shift-Left DevSecOps with Atlassian, AWS & Lacework
Shift Left Faster: Infrastructure as Code (IaC) Security For the Win
Wappnen Sie sich mit Lacework gegen Ransomware in der Cloud
Cloud Threat Report, Vol. 2
Hypergiant erfüllt Compliance-Vorgaben, konsolidiert Tools und reduziert die Anzahl der Warnmeldungen um 70 %
Hypergiant macht von Lacework Gebrauch, um bessere Transparenz zu erreichen
Drei fundamentale Konzepte für die Security von Infrastructure as Code
A Look Inside Lacework's Revolutionary Polygraph®
The Essentials To Scaling Your SIEM
Reltio nutzt Lacework, um Tools zu konsolidieren, umfassende Transparenz zu erreichen und Warnmeldungen 4x schneller zu bearbeiten
CallTrackingMetrics gewinnt mit Lacework und AWS-Lösung an Sichtbarkeit und Sicherheit
The ABCs of Cloud Security
New Relic Solution Brief
Presidio and Lacework Partnership
Lösungsüberblick: Snowflake
Hypergiant and Lacework
Video: Fallstudie Hypergiant
Cloud Threat Report 2021, Volume 2 Review
Reckless to Fearless: Automating Remediation in the Cloud
So erkennt Lacework Anomalien
So können IHRE Daten zum weitreichenden Erfolg im Bereich Cloud-Security beitragen
How the Cloud Breaks Traditional Security Approaches
Grundlagen der Container Security
Behaviors of Compromised Cloud Environments
Lacework Cloud Threat Report, 2021 Volume 1 Review
Grundlagen der Cloud-Security
Achieve Cloud Security Cost Savings Through SIEM Optimization
Tevora: Simplify Continuous Compliance and SOC 2
Achieve Cloud Security Savings through SIEM Optimization
Erkenntnisse zur Cloud Security anhand von AWS-Daten
LendingTree Automates AWS Security for DevOps Teams and Stays Compliant with Lacework
Solving M&A Challenges with Cloud Security
Erzielen Sie mit AWS Graviton2 40 % Einsparungen in Bezug auf die Cloud-Infrastruktur
Top 5 Strategies to Balance Container Advantages and Risks
Cloud Threat Report, Vol. 1
Addressing Compliance and Audit Challenges in the Cloud
7 Key Considerations Before Sending AWS CloudTrail Logs to a SIEM
So stellen Sie sich den einzigartigen Herausforderungenm Bereich Cloud- und Container-Security
Erzielen Sie eine 90 %ige Zeitersparnis bei Untersuchungen in AWS Security
Protecting Your AWS Environment with Ease
Secure Modern Cloud Applications and Infrastructure
How to Accelerate Container Adoption
Optiv
Observian
Drift steigert dank Lacework die Transparenz und Security in der AWS-Cloud, fördert das Wachstum und unterstützt die Compliance-Ziele.
Simplify compliance for the cloud
Gaining Complete Cloud Visibility as You Scale
Top Mistakes to Avoid When Using Cloud Provider Security Tools
Why Compliance is Not Enough When it Comes to Cloud Security
The Journey to Mature Cloud Security
Cloud Security for Health IT
Poka erzielt Transparenz in Bezug auf Container mit tiefgehendem Anwendungskontext
Marqeta ermöglicht schnellere Anwendungsentwicklung und erhöhte Sicherheit
Awards Are Nice But Our Focus Is Great Software
AWS CloudTrail Solution Brief
Top Ways Your Cloud Approach is Burning Cash
Carson Living secures rapidly growing cloud environment with Lacework
DataVisor bietet dank Lacework Skalierungsmöglichkeiten für Kunden im Bereich Multicloud-Security und -Compliance
Rules Optional Ep. 2 | San Francisco
Rules Optional Ep. 1 | San Jose
Jitterbit secures dynamic cloud environments, containers, and microservices at scale with Lacework
CISO's Playbook to Cloud Security
The Cube AWS re:Invent 2019
Cazena secures massive cloud data lakes with Lacework
Vikram Kapoor at KubeCon + CloudNativeCon 2019
Lacework Live from AWS re:Inforce 2019
How to Build a DevSecOps Culture
Why Cloud Native, API Centric Applications Require Built-In Security
The Cube Interview with Lacework CEO, Dan Hubbard
Working at Lacework
Vermeidung von Datenlecks in der Cloud mit Anomalie-Erkennung
Lacework Live from Black Hat 2019
Security-Tools für Multi-Cloud-Bereitstellungen
Die Rolle von Kubernetes in der Cloud-Security
Lacework Shifts Left for DevOps Security
Lacework Tap Talk: Lacework Shifts Left
Lacework Tap Talk: Platforms vs. Products
Ein Security-Leitfaden zur Container-Orchestrierung
Automating Security for Cloud Workloads
Lacework Demo: Gain Visibility & Protect Your AWS, Azure, and GCP Clouds
Lacework Product Demo
Sicherung von Container in einer Cloud-Umgebung
Resetting Your Security Thinking for the Public Cloud
Inside Lacework: Kubernetes and Google Cloud Platform
Workload Security
Container Security
Google Cloud Security
Azure Security
AWS Security
Erkennung von unerlaubten Host-Zugriffen
Abwehr von Runtime-Bedrohungen
Überwachung der Datenintegrität
Kubernetes Security
Cloud Account Security
Compliance von Konfigurationen
Anomalie-Erkennung
Lacework for Azure & Multicloud Environments
Latest Kubernetes Product Features at KubeCon
Flatiron Health
Einblick in Lacework: Einführung in die Workload-Security
Inside Lacework: Set Up Lacework with AWS
Lacework Cloud Workload Security
Guidebook
Guidebook gains visibility, cross-functional versatility and effective protection with Lacework and AWS solution
Expanding Security Operation Center Coverage to the Cloud
Lacework Host-Based Intrusion Detection Solution (HIDS)
Wavefront secures DevOps environments at scale with Lacework
Snowflake gains end-to-end visibility into their environment with Lacework Polygraph
Lacework File Integrity Monitoring
Insider Threat Management
Breach Detection
Lacework Compliance to CIS Benchmark for AWS
Lacework AWS S3 Bucket Protection
Large Networking Firm
Profiles
Auszeichnungen
Partner Categories
Partner Area
Resources Types
Resources Tags
Profiles