Vikram Kapoor - Founder, Chief Technical Officer, Author at Lacework

Search Results

Results For:
Blog

Shining a new light on security in the cloud era

Cloud computing is fundamentally transforming the way people interact with the world and how companies get business done. And while the cloud has allowed businesses… Read More

Read More
Blog

What is the Difference Between Performance and Security Monitoring?

There are many important discussions taking place regarding how performance monitoring works, and although security monitoring shares a lot of common themes, it also differs… Read More

Read More
Blog

How Do Lacework Polygraphs© Remove Security Toil?

To gain an understanding of Polygraphs&#169, let’s first consider the differences between data and insights. Let’s imagine we have a user who likes… Read More

Read More
Blog

Lacework pour les environnements Azure et multi-cloud : une solution unique pour les problèmes de sécurité du cloud

Lacework today announced security support for Microsoft Azure, which means two things: Our customers get threat detection of behavioral anomalies for cloud and… Read More

Read More
Blog

What are the New Attack Vectors in AWS?

By 2021, Cisco expects 94 percent of workloads and compute instances to be processed by cloud data centers. Attackers are already starting to focus and targeting cloud accounts, moving away from traditional data centers. Read More

Read More
Blog

AWS account Security: a great example to compare and contrast Lacework with CASB solutions

Lacework is a cloud security company, and we recently launched Lacework for AWS CloudTrail, a new solution focused on AWS account security. Securing a “cloud… Read More

Read More
Blog

Polygraphs: Behavior Baselining to Reveal the Elephant

You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them… Read More

Read More
Blog

Introduction to Polygraphs

In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap two of the fundamental characteristics any CWPP should have: Read More

Read More
Blog

Lacework Coming Out Of Stealth!

An incredible milestone in a journey that started two years ago with a simple question: Why does it take enterprises 6+… Read More

Read More