Search Results
Results For:
50 CISOs to watch
The role of CISO is one of the most important in any organization, and one that holds some of the most significant responsibilities: keeping… Read More
Lire la suiteShining a new light on security in the cloud era
Cloud computing is fundamentally transforming the way people interact with the world and how companies get business done. And while the cloud has allowed businesses… Read More
Lire la suiteWhat is the Difference Between Performance and Security Monitoring?
There are many important discussions taking place regarding how performance monitoring works, and although security monitoring shares a lot of common themes, it also differs… Read More
Lire la suiteHow Do Lacework Polygraphs© Remove Security Toil?
To gain an understanding of Polygraphs©, let’s first consider the differences between data and insights. Let’s imagine we have a user who likes… Read More
Lire la suiteLacework pour les environnements Azure et multi-cloud : une solution unique pour les problèmes de sécurité du cloud
Lacework today announced security support for Microsoft Azure, which means two things: Our customers get threat detection of behavioral anomalies for cloud and… Read More
Lire la suiteWhat are the New Attack Vectors in AWS?
By 2021, Cisco expects 94 percent of workloads and compute instances to be processed by cloud data centers. Attackers are already starting to focus and targeting cloud accounts, moving away from traditional data centers. Read More
Lire la suiteAWS account Security: a great example to compare and contrast Lacework with CASB solutions
Lacework is a cloud security company, and we recently launched Lacework for AWS CloudTrail, a new solution focused on AWS account security. Securing a “cloud… Read More
Lire la suitePolygraphs: Behavior Baselining to Reveal the Elephant
You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them… Read More
Lire la suiteIntroduction to Polygraphs
In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap two of the fundamental characteristics any CWPP should have: Read More
Lire la suiteLacework Coming Out Of Stealth!
An incredible milestone in a journey that started two years ago with a simple question: Why does it take enterprises 6+… Read More
Lire la suite