Blog

Security Advisory: Critical vulnerabilities in VMware

Lacework introduces new Kubernetes Audit Logs monitoring

Lacework joins the CNBC Disruptor 50 List

Balancing small team demands with the need for cloud visibility

Lacework goes to FutureStack

Malware targeting latest F5 vulnerability

Lacework at Kubecon + CloudNativeCon Europe 2022

How developers can prevent bad actors

What Is cloud security?

Lacework CEOs and Presidio discuss cloud security

Cybersecurity and breach regulations - Are you ready?

Securing your supply chain

Using machine learning to solve your business problems

NginxDay

Prevent cybersecurity burnout

Ten tips for building a vulnerability management pipeline

The OAST with the most

Actionable threat intel in the cloud

New Lacework report reveals increase in sophisticated cloud attacks

Achieving SOC 2 compliance with Lacework

Heightened cyber threats have everyone on edge, what do you need to know?

Forrester Consulting Study finds Lacework generated 342% return on investment

Gaming and cloud security, don’t get played

Lacework named only security company in top-10 of Forbes’ Best Startup Employers

The role software developers play in the cybersecurity space

Elevate your cloud security knowledge with Lacework Academy & Community

Celebrating International Women’s Day

A guide to responding to the Log4j vulnerability

Why visibility and permissions are key to Kubernetes security

Top 5 security incidents of 2021

Identifying active vs. dormant Log4j vulnerabilities

Lacework continues investment in partner ecosystem

Lacework Partners with Google Cloud

Shining a new light on security in the cloud era

Evaluate your cybersecurity posture for Data Privacy Day

Log4j Today - Prepare for What’s Next
Vous souhaitez voir Lacework à l'œuvre ?
Détectez plus vite les menaces inconnues et surveillez en permanence les signes de compromission. Essayez-nous pour découvrir la différence par vous-même.