Pages
Posts by category
Category: Blog
What is threat detection and response?
The Polygraph journey
50 CISOs to watch
Go farther with Fargate: secure your containers with Lacework
‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why
Lacework named a Leader in G2 Winter Reports
CISO Series: Why cloud security is a different beast than on-premise
It’s time to scale up your cloud security posture
Know your enemy: A look at 4 common attack paths
Manage Lacework with AWS CloudFormation and CDK
What is CSPM?
AndroxGh0st – the python malware exploiting your AWS keys
Lacework integrates with Amazon Security Lake to reduce complexity in your cloud
New AWS Account Factory Customizations automates AWS account onboarding into Lacework
The most effective CNAPP leverages agentless and agent-based security
Best of both for CSPM: Lacework & AWS Security Hub
Machines won’t replace threat hunters until they master this one skill
Lacework welcomes new Chief Financial Officer, Andrew Casey
Frost & Sullivan report names Lacework a CNAPP market leader
Lacework welcomes new Chief Marketing Officer Meagen Eisenberg
Why behavior-based threat detection is critical for cloud workload security
Priorisez les risques les plus sérieux et réduisez le temps moyen de réponse avec Exposure Polygraph
Lacework is once again named a Leader by G2
10 easy ways to learn about cybersecurity without being bored to tears
I tried to write about containers, but realized I needed to understand images, Docker, and Kubernetes first
Promoting cybersecurity awareness in your boardroom
What you need to know about the latest critical OpenSSL vulnerability
Achieving Kubernetes best practices with CIS Benchmark for Amazon EKS
We ignored the dangers of containers 30 years ago, and we’re doing it
Taking a data-driven approach to a Zero Trust model
Don’t waste your time following these 3 password security rules
New Lacework Cloud Threat Report reveals stealthier adversaries are focusing on infrastructure
Threat detection and response tools are built on shaky foundations, leaving your cloud workloads at risk
Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think
Can your cloud security vendor help you level up?
Cloud security fundamentals for an informed buyer
ESG shares takeaways on IaC security trends
Prioritizing your container image pipeline
How your cloud security practice can support teams working at wildly different maturity levels
Attackers want your identity and know exactly where to find it
The top challenge for your cloud security practice isn’t what you think
5 practical tips to lock up your Kubernetes security
Agentless workload scanning brings better visibility without new security risks
Critical infrastructure is more vulnerable than ever—your industry could be a prime target
How fintech companies can protect consumer trust, starting with the cloud
The top cloud security challenges in 2022
Recent trends in S3 targeting
The future of security means focusing on people
4 surprising things I learned about hackers at Black Hat
Knowing your cloud is knowing what’s normal…and what’s not
A short pause along the path to celebrate being on the Forbes Cloud 100
Time series model brings another dimension of analysis, uncovering cryptomining threats
Powerful Lacework alerting overhaul helps teams act faster, together
ESG reveals developer security priorities in new study
The one piece of advice that most AWS re:Inforce presenters agreed on
Sleeping through AWS Cloud compliance meetings? You are not alone
Lacework drives customer innovation with confidence on AWS
My hope for the AWS re:Inforce 2022 keynote
Will breakthrough security technology solve the next big art heist or make it worse?
How to guarantee your time is well spent at AWS re:Inforce
Identifying detection opportunities in cryptojacking attacks
The types of sessions at an AWS conference and why they matter
ISO 27001 update gives a cloud callout to help you build your security practice
How Watchdog smuggles malware into your network as uninteresting photos
Increasing multicloud visibility and enabling innovation, from gaming to healthtech
What is visibility and why it’s important to cloud security
Are cybercriminals lazy or brilliant for selling your passwords instead of using them?
Security is one pillar of building in the cloud, not the only one
Healthcare: Where cloud security can save lives
ClearPath report shows automation and good policy can help beleaguered security professionals
Kubernetes tools are helpful for your team and sadly, your attacker
Ransomware hits the cloud
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134
Four tips for attending RSA Conference 2022
Security Advisory: CVE-2022-26134 RCE in multiple Atlassian products
More flexibility and visibility with agentless coverage for workloads
Lacework expands workload security capabilities to protect Windows Server
New integration with Kubernetes admissions controller
Lacework Update
Embed IaC security at the earliest stage in development
Security Advisory: Critical vulnerabilities in VMware
Lacework présente de nouveaux logs d'audit Kubernetes
Lacework joins the CNBC Disruptor 50 List
Balancing small team demands with the need for cloud visibility
Lacework goes to FutureStack
Malware targeting latest F5 vulnerability
Lacework at Kubecon + CloudNativeCon Europe 2022
How developers can prevent bad actors
What Is cloud security?
Lacework CEOs and Presidio discuss cloud security
Cybersecurity and breach regulations – Are you ready?
Securing your supply chain
Introducing Container & Workload Security for AWS Fargate
Using machine learning to solve your business problems
NginxDay
Prevent cybersecurity burnout
Ten tips for building a vulnerability management pipeline
The OAST with the most
Actionable threat intel in the cloud
Un nouveau rapport de Lacework révèle une augmentation du nombre d'attaques complexes du cloud
Achieving SOC 2 compliance with Lacework
Heightened cyber threats have everyone on edge, what do you need to know?
L’étude de Forrester Consulting révèle que Lacework a généré un retour sur investissement de 342 %.
Gaming and cloud security, don’t get played
Lacework named only security company in top-10 of Forbes’ Best Startup Employers
Le rôle des développeurs de logiciels en matière de cybersécurité
Améliorez vos connaissances en matière de sécurité du cloud grâce à Lacework Academy et à la Communauté Lacework
Celebrating International Women’s Day
A guide to responding to the Log4j vulnerability
Why visibility and permissions are key to Kubernetes security
Top 5 security incidents of 2021
Identifying active vs. dormant Log4j vulnerabilities
Lacework continues investment in partner ecosystem
Lacework Partners with Google Cloud
Shining a new light on security in the cloud era
Evaluate your cybersecurity posture for Data Privacy Day
Log4j aujourd'hui : se préparer pour demain
What the Cloud? DevOps and DevSecOps Explained
Vulnérabilité de Log4j : utilisation de la détection d'anomalies comportementales pour repérer les attaques actives
Modèle de responsabilité partagée
Innovations pour notre agent moderne
De Log4j à l'avenir des entreprises : notre bilan de l'année
Répondre aux problèmes de cybersécurité tels que Log4j... et tous les autres
Log4j and Whatever Comes Next: Taking Care of Customers
Attaques Log4j – Bilan sur une semaine
Vulnérabilité de Log4j : utilisation de la détection d'anomalies comportementales pour repérer les attaques actives
Comment gérer la faille Log4j dans votre environnement
CVE-2021-43326 : élévation des privilèges de Automox
Lacework Labs Identifies Log4J Attacks
What Does 2022 Hold For Your Cloud Security Practice?
Prévisions de sécurité Lacework Labs 2022
What AWS re:Invent 2021 Means For The Future of Cloud Computing
Introducing Lacework Academy, Our New Online Learning Platform
ABC Botnet Attacks on the Rise
Protect yourself for Cyber Monday
Security just as important for small businesses
Protéger l'avenir du travail
Lacework partner, Observian, achieves AWS Level 1 MSSP Competency
Lacework acquires Soluble, increasing shift-left capabilities
Un approche axée sur les données pour protéger l'avenir du travail
You Can’t Secure What You Can’t See
Securing the Cloud: Behavior is Better than Rules
Sand & Honey: Building Honeypots
Introducing Cloud Security Automation for Dummies
TeamTNT Continues to Target Exposed Docker API
Data Driven: Lacework and Snowflake Partner to Supercharge Security Operations
DIY Canary Tokens in AWS
“Spytech Necro” – Keksec’s Latest Python Malware
The New Cybersecurity Awareness: Data, Disinformation, and Security as a ‘Differentiator’
Mirai goes Stealth – TLS & IoT Malware
HCRootkit / Sutersu Linux Rootkit Analysis
CNAPP, CSPM, CWPP et compagnie : qu'est-ce qui les distingue et comment améliorent-ils la sécurité de mon cloud ?
PYSA Ransomware Gang adds Linux Support
Muhstik Takes Aim at Confluence CVE 2021-26084
Lacework 2021 Cloud Threat Report Vol. 2
Sécurité des containers moderne : cas d'utilisation
AWS re:Inforce 2021 Key Takeaways
Engineering A More Secure Cloud
Des menaces bien visibles qui profitent du manque de politiques d'audit Kubernetes
Un nouvel espoir pour les infrastructures critiques
Welcome Jay Parikh – The New Co-CEO of Lacework
La sécurité du cloud est un problème qui relève des données
Top Ways Your Cloud Security Approach is Burning Cash
Threat Research with Snowflake & VirusTotal
Sécurité avec ou sans agent : quelle option choisir ?
Hidden Bugs in The Mines: Examining Vulnerabilities within Cryptocurrency Miners
Préserver votre infrastructure grâce à la détection des anomalies à l'aide de Polygraph de Lacework
Qu'est-ce que la sécurité des containers ?
Clés SSH de repérage des menaces – Fonctionnalité de script bash – Pivoting
Le piratage façon 1999 – l'automatisation façon 2021
Keksec & Tsunami-Ryuk
Pourquoi suis-je ici ?
Enquête ESG sur la Cloud Security : l'automatisation et la simplification sont privilégiées
Accès au cloud : dernières offres contre les hackers d'accès initial
Démêler la complexité de la Cloud conformité
Mettre les images Docker de TeamTNT hors ligne
Activité récente du 8220 Gang avec un mineur personnalisé et un botnet
5 étapes de cloud security pour détecter les menaces lors des fusions et acquisitions
Opérations sur les canary tokens et les ransomwares
5 étapes pour une sécurité efficace des containers
Cpuminer & Friends
Sysrv-Hello Expands Infrastructure
Lacework Security for AWS Graviton2 ARM-based Infrastructure: Why It Matters
Lacework Achieves AWS Container Security Competency Status
Introducing Asset Discovery for AWS Environments
Présentation des déploiements IaC sécurisés et automatisés avec Terraform
Renforcer la sécurité, la visibilité et l'automatisation dans les environnements AWS
Resolving Embedded Files at Runtime via strace
Carbine Loader Cryptojacking Campaign
Up and Running with Lacework Terraform Modules for AWS
The Cloud Security Evolution: From Point Products to Platforms
Le réseau "Kek Security".
Les bonnes pratiques AWS CloudTrail, SIEM et Lacework
Paré pour le succès avec le fournisseur Terraform pour Lacework
Groundhog Botnet Rapidly Infecting Cloud
4 choses à savoir sur la conformité SOC 2
A $525 Million Growth Round To Scale Lacework
TeamTNT Builds Botnet from Chinese Cloud Servers
Complete Cloud Visibility with Agent Based Security
Up and Running with Lacework and AWS Code Build (Update)
SolarWinds & the Software Supply Chain
Top 5 Ways Your Cloud Security Approach Is Burning Cash
Announcing Lacework on the Terraform Registry!
Top Tips for Navigating the Murky Waters of DevSecOps
Lacework Achieves Unparalleled Security through Exceptional Partner Relationships and Solutions
Meet Muhstik – IoT Botnet Infecting Cloud Servers
Moobot’s Cloud Migration
Up and Running with Lacework and Hashicorp Packer
The Redis Rush
Up and Running with the Lacework CLI
It’s Here: Lacework’s Active Host Vulnerability Monitoring
Up and Running with Lacework and Jenkins
What is the Difference Between Performance and Security Monitoring?
Doki Dukes with Kinsing
How Do Lacework Polygraphs© Remove Security Toil?
Introducing the Terraform Provider for Lacework
What Is Cloud Workload Protection?
La guerre des Bash
Chère sécurité, il est temps de parler blocage et Shift Left
Kubernetes Recon : pleins feux sur les conclusions autour de la matrice d'attaque de Kubernetes
Who’s Attacking My Containers?
H2Miner Botnet – Act 2
Lacework Priorities: Continued Safety and Security – A Commitment to our Customers and Employees
Research Automation with ATT&CK & Python
The Biggest Cloud Breaches of 2019 and How to Avoid them for 2020
Automating Enforcement and Response in 2020
CWPP Security 101
Secure DevOps with Datadog and Lacework
Guide complet sur l'architecture de la sécurité des containers
Cloud Wars & K8s Attacks: Speaking Engagements this November
AWS Security Best Practices for 2020 You Need to Implement
NIST Cybersecurity Framework and Your Cloud
PCI DSS Compliance Checklist and HIDS Requirements
DerbyCon 9.0 & BSides Denver ‘19
It’s Time for a New Generation of Security
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 2
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 2
Avoid Gaps in Native Cloud Security Tools With a Comprehensive Security Approach, Part 1
Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly
Lacework Resolves the Container Security Gap
Developing a Security-First Model for Cloud Compliance
The Rise of DevOps and the Fall of Organizational Walls
Enforce Security Through Policy-as-Code
Cloud & Container Security: Three Great Talks and Tools from Black Hat 2019
Cloud Anomaly Detection and Vulnerability Assessment Needs to Yield Actionable Alerts
Developing a Cloud & Container Incident Response Plan
A Quick Guide to Container Orchestration Vulnerabilities
Renforcer la sécurité native de Kubernetes
The Value of Enhancing Native AWS Security Tooling
Lacework Threat Detection in Cloud Environments: A Quick Guide
How Capital One Illustrates the Need for Cloud Configuration Visibility
Lacework Labs Upcoming Speaking Events
Cloud Security Incident Response: Continuous vs. Emergency Approaches
How to Improve Breach Detection in the Cloud
Cloud Compliance Security, Part 2: The Importance of Security Controls
Cloud Compliance Security, Part 1: Understanding Expectations & Building Requirements
Cryptojacking Malware Gets Creative with Variable Names
The Value of Enhancing Native AWS Security Tooling
Why Linux Servers Need Extra Security
Container Orchestration Demands a Security Focus
A Deep Dive Into Three Popular CVE-2019-3396 PoCs Used in Confluence Attacks
The Lacework Guide to AWS re:Inforce in Boston
The Shift is On: Why Lacework is Extending Security From Run Time to Build Time
Container Orchestration Demands the Right Security Approach
Cloud Controls to Major Tom: A Quick Guide to Configuration as a Security Measure
Lacework: Leading the Way From Product to Platforms
Without Security Visibility and Analysis, BlueKeep Keeps on Keeping On
Host Intrusion Detection for Compliance in AWS and Multicloud Environments
Misconfigured Servers Leave 2.3 Billion Private Files Exposed
DevOps et temps d'exécution : l'automatisation au service de la sécurité
4 Ways Lacework Detects Confluence Attacks
The Benefits of a Host-Based IDS for Cloud Environments
Securing the Most Vulnerable: Medical Device and Patient Data Security is Critical
Si vous pouvez le voir, vous pouvez le sécuriser : détection des anomalies dans le cloud
AWS Database With No Password Exposes 49 Million Instagram Accounts
An Unauthenticated RCE Gold Rush: A Look at Attacks Exploiting Confluence CVE-2019-3396
Effective Compliance Requires a Security-First Approach
La visibilité est indispensable pour se défendre contre les menaces liées aux workloads
Easily Overlooked Container Security Risks
Citrix’ Undetected Hackers Are Why You Need Anomaly Detection
80 Million Personal Records Discovered on Open Microsoft Database
Rules and Best Practices Still Couldn’t Prevent the Docker Hub Breach
Do Data Leaks Have to Be So Common?
Silent But Deadly: Cloud Security and Cryptomining
Be Quick But Don’t Hurry: Container Security in Cloud Environments
Latest Hacks: Legal Docs Exposed Through Unprotected Elasticsearch Server
Top 10 Threats to Cloud Security: AWS Security Week New York
The Basics of Configuration Compliance
Latest Hacks: Microsoft’s Hotmail, MSN Compromised With User Credentials
Cryptojacking Campaign Targets Exposed Kubernetes Clusters
Why Process-to-Process Visibility Is So Important
Stratics Networks Robocaller Database Exposed on AWS
The New School of Security: Using the Cloud to Secure the Cloud
Facebook Exposes User Data Through Unprotected AWS S3 Buckets
File Integrity Monitoring: Using Lacework’s SaaS Solution for SaaS Environments
Cloud Security This Week – March 29, 2019
There Are a Lot of Ways to Get Cloud Security Wrong
Security Relevance Can’t Be Bought
Cloud Security This Week – March 22, 2019
Integrating DevOps and Security
Triaging a CryptoSink Infection in 5 Minutes with Lacework
The Cloud’s Unique Security Challenges
Anomaly Detection vs. Rules: Better Security Insights, Designed for the Modern Enterprise
Container Security: A Popular Topic at BSidesSF ‘19
Cloud Security This Week – March 1, 2019
Talking Kubernetes at Denver ISSA
For Those About To Rock RSA, Lacework Salutes You!
PCI Compliance in the Public Cloud
Cloud Security This Week – February 22, 2019
Lacework pour Google Cloud : sécurité de l'orchestration, du multi-cloud et de Kubernetes
Lacework pour les environnements Azure et multi-cloud : une solution unique pour les problèmes de sécurité du cloud
Art Into Science: Conference Overview & Securing K8s
Your etcd is Showing: Thousands of Clusters Open to the Internet
Takeaways From my First Week at Lacework
ELF of the Month: New Lucky Ransomware Sample
The Unending Saga of Equifax Won’t Go Away. That’s Good News For Anyone Who’s Not Equifax.
5 Highlights From an Exceptional Year at Lacework
Cloud Security This Week – December 21, 2018
Is Your Cloud Giving or Receiving This Holiday Season?
My Mom is Sick and Tired of Your Weak S3 Bucket Policies
Kubernetes CVE-2018-1002105
Cloud Security This Week – December 14, 2018
Cloud Security This Week – November 30, 2018
ELF of the Month: Linux DDoS Malware Sample
Next Generation Firewall is Your Grandfather’s Generation in the Cloud
Securing Innovation in the Public Cloud
A Cybersecurity Three Pointer: How Basketball Explains Risk in the Cloud
Why Organizations Are Still Learning From the Uber Breach
Cloud Security This Week – October 26, 2018
Security Table Stakes: A Blueprint for Securing Your Cloud Environment
Cloud Security This Week – October 19, 2018
Redis Compromise: Lacework Detection
Anatomy of a Redis Exploit
Cloud Security This Week – October 12, 2018
The New Security Stack: While old school security vendors are trying to buy their way into relevance, it’s still not making organizations any safer
Cybersecurity is Everyone’s Business, All the Time
Cloud Security This Week – September 28, 2018
I Read the News Today, Oh Boy
This is How to Optimize CloudTrail to Improve the Security of Your AWS Environment
Privilege Escalation and a Proposal for Acceptable Exclusion
Lacework Supports PCI Compliance with FIM Solution
Kubernetes, Pizza, and Learning From Our Community
Using the Cloud to Secure the Cloud: Lacework and the New Era of Cloud Security
PCI Compliance for Cloud Environments: Tackle FIM and Other Requirements With a Host-Based Approach
I Just Looked at 2 Billion Cloud Events. Here’s What I Found.
Security Can’t Start Until Multi-Factor Authentication is Turned On
Lacework Named a 2018 Gartner Cool Vendor in Cloud Security and Recognized in Market Guide for CWPP
How Ronaldo’s Hair Explains Cybersecurity
Containers At-Risk: A Review of 21,000 Cloud Environments
Timing Security Market Transitions
Refocus on What Matters: Risks vs Threats
Containers in the Cloud: From Top Hazards to First-Class Cloud Security Citizen
Avoiding Holes in Your AWS S3 Buckets
GOING TO RSA? HERE’S YOUR PRE-SHOW CHECKLIST FOR AWS SECURITY
What are the New Attack Vectors in AWS?
Why Use a Host-Based IDS in AWS
Driving Towards Least Privilege in AWS: A Baker’s Dozen
Survey Highlights Top Four Trends in Cloud Security Adoption
Context is King: Building Bridges Between DevOps and Security, Part IV
Visibility: A Technical Chauffeur of Data, Part III
Building Bridges from Security to Development, Part II
5 Steps to Eliminate AWS Misconfigurations and Open S3 Buckets
Bridging the Gap Between Security and DevOps, Part I
AWS re:Invent Recap: Is This the end of the Enterprise Security Market?
The Breach: You Can’t Secure What You Can’t See
Why I joined Lacework: the opportunity to define a better approach to Securing the Cloud
One employee gets the blame at Equifax. Fair?
AWS account Security: a great example to compare and contrast Lacework with CASB solutions
Build the Foundation for Faster cloud compliance with cloud Visibility
Another Multi-Billion Dollar Cybersecurity Catastrophe at Equifax
Forrester’s Insights into Cloud Workload Security: Automate, Automate, Automate
More Machine Learning Models != Better Results
One of the Harshest Cybersecurity Regulations: Will NY DFS Part 500 of Title 23 Impact You?
Real-World AWS Account Compromises and How Lacework Stops Them
A Security Mindset Reset: Five Reasons Network Security Just Doesn’t Work in the Cloud
Polygraphs: Behavior Baselining to Reveal the Elephant
Introduction to Polygraphs
Smitten with containers? What about security?
Whack-a-Mole – Wanna Cry!!
Lacework Coming Out Of Stealth!
Security Challenges: Just a Handful
No Policies. No Rules. No Logs.
Category: Labs
In The News
Cloud-Security Startup Lacework Taps New CFO as It Weighs IPO
Lacework Names New Americas Channel Chief, CFO, CMO
Former MongoDB and TripActions CMO Meagen Eisenberg joins Lacework as Chief Marketing Officer
CNBC’s Top Startups for the Enterprise: Lacework
Google Cloud Gets Lacework’s CNAPP, Multi-Cloud Visibility
Google Cloud improves security, adds CNAPP integration with Lacework
Lacework Brings Its CNAPP Solution To Google Cloud's Chronicle Security Operations
Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report
Security Testing Improves Headaches & Compliance
Lacework rolls out Cloud Hunter tool
Low code doesn’t necessarily mean low security risks
New Lacework Cloud Hunter offers environmental analysis and improved response time
It's Time to Make Security an Innovation Enabler
Clariness selects Lacework to future-proof cloud security
Lacework 'unifying' under single CEO as David Hatfield steps down
Lacework implements security control for Avenue Bank platform
CNAPP buyers guide: Top tools compared
Cloud cybersecurity necessitates automation
September is National Insider Threat Awareness Month - Experts Weigh In
Lacework Named To The Forbes Cloud 100
Lacework Named To The Forbes Cloud 100
What one piece of advice would you offer to a CIO if you were talking to them right now? (print edition, p32-25)
Why Software Shifted Left
How Developers Can Thwart Bad Actors
Enemybot: a new Mirai, Gafgyt hybrid botnet joins the scene
What We Can Learn From Lapsus$ Techniques
New research: Australian and New Zealand organisations move towards DevSecOps
ANZ Organisations Moving Toward DevSecOps
More ANZ organisations warm to DevSecOps
Cloud threat actors hone in on vulnerabilities, report finds
Lacework Labs Cloud Threat Report identifies most exploited vulnerabilities
Intelligent CIO asks Graham Pearson of Lacework - What one piece of advice would you offer to a CIO if you were talking to them right now?
Brian Lanigan is Lacework’s new VP of Worldwide Channels and Alliances
Lacework Hires New Partner Leader, Building on Recent Partner Momentum
Lacework hires new partner leader to build on recent channel momentum
Lacework Hires Splunk Vet to Lead Worldwide Channels, Alliances
Lacework recrute Brian Lanigan de Splunk comme responsable mondial des canaux de distribution.
Lacework builds threat detection with Morpheus AI security framework
Lacework's Graham Pearson: 'I want to build the company everyone wants to work for'
Découvrez les meilleurs employeurs startups d'Amérique 2022
Dynamic Business features Danielle Dungo, Senior Manager, Strategy & Sales Operations, Lacework
Lacework Fills Need for Runtime Security
10 experts redefining recruiting and retaining talent in tech
Jay Parikh, co-PDG de Lacework, évoque la difficulté de faire face à un environnement d'embauche complexe.
Cybersecurity Market Sets Records for Venture Capital in 2021, Expected To Keep Rolling Through 2022
High Profile Attacks Make Security a Board-level Topic - Lacework VP and general manager EMEA, Jesper Frederiksen
Themes From Momentum Cyber’s 2022 Cybersecurity Almanac
La société Lacework, spécialisée dans la sécurité du cloud, a récolté la somme record de 1,3 milliard de dollars lors d'un deuxième appel de fonds (série D)
Cloud Security Provider Lacework Closed a $1.3 billion Round
Lacework Scored $1.3 Billion in Series D Funding Round
Lacework Platform secures Kubernetes environments
2021 Record Year for Cybersecurity M&A, Financing: Report
2021 was a record-breaking year for cybersecurity startups
Lacework unveils enhanced Polygraph multi-cloud security platform
Lacework Enhances Channel Program To Support Partners’ Go-To-Market Motions
5 Companies That Came To Win This Week Feb 4
Lacework Introduces Polygraph® Data Platform
Lacework launches tiered partner program
Lacework Launches Enhanced Partner Program For Cloud Security Growth
Lacework Introduces Polygraph Data Platform
Lacework expands capabilities for fixing Log4j flaw
New Lacework platform helps companies uncover suspicious activity in the multicloud
Lacework Plunges Polygraph Into Multi-Cloud, Prioritizes Log4j Remediation
Why Security Pros Are Frustrated With Cloud Security
Lacework Partners with Google on Cloud Security and Announces Investment from GV
the Cyberwire - Daily Briefing
Lacework Unveils Tiered Partner Program To Aid Channel Sales
5 Channel Partner Program and MSP News Updates
Lacework Enhances Partner Program
Cloud security unicorn Lacework secures funding from Google
Over half of time spent on security issues is wasted
Lacework embauche l'ancien vice-président de l'ingénierie chez Facebook pour développer sa plateforme de cloud security
Votre guide complet de l'AWS Startup Showcase, présenté par theCUBE
Flashpoint acquires Risk Based Security. iProov raises $70 million. Signal's CEO steps down, naming Brian Acton as interim CEO.
Technologie de sécurité : les clés du défi cybernétique
Largest venture capital deals in the Bay Area in 2021
SoftBank, Tiger Still Lead Pack Of Spendiest Startup Investors In The World
Cybersecurity Venture Funding Surpasses $20B In 2021, Fourth Quarter Smashes Record
Jesper Frederiksen joins Lacework as General Manager for EMEA
Lacework Welcomes Jesper Frederiksen As General Manager For EMEA
5 Cybersecurity IPOs We Expect in 2022
6 Cybersecurity Facts We Learned in 2021
The Year’s 10 Biggest VC Funding Rounds: Cruise, Rivian And Lots Of Billion-Dollar Deals
6 things in cybersecurity we didn’t know last year
From a CEO Revolving Door to Comparisons With Snowflake: Security Startup Lacework Bounces Back
Kubernetes security will have a breakout year in 2022
Lacework Cloud Care helps security teams uncover Log4j vulnerability
Lacework Introduces New Free Cloud Care Program to Aid in Industry Fight Against Log4j
What the Log4Shell Bug Means for SMBs: Experts Weigh In
Log4Shell Is Spawning Even Nastier Mutations
Cloud application developers need built-in security
Databricks, a $38 Billion Startup, Creates Its Own Venture Fund
Money Moves: November 2021
Companies Respond to Log4Shell Vulnerability as Attacks Rise
Overcome the security talent shortage by addressing your tech stack
15 Experts Share 2022 Security Predictions
Will DevSecOps Finally Take Off?
Cybersecurity M&A Roundup: 40 Deals Announced in November 2021
Lacework lève 1,3 milliard de dollars
Lacework Raises $8.3 Billion in Growth Funding
Investors Cash in as Users Fight a Perpetual Cyber War
Lacework Raises $1.3B On $8.3B Valuation To Expand Channel
Cloud security company Lacework draws $8.3 billion valuation in private funding round
Cloud security unicorn Lacework lands record-busting $1.3B funding round
Lacework lands $1.3B to expand its cloud cybersecurity platform
Cloud security startup Lacework valued at $8.3 bln after mammoth funding round
Investor Group Pledges $1.3 Billion to Data-Security Platform Lacework
Cloud wars: Four tech giants vow to take the military into the cloud
Cloud security vendor Lacework expands into A/NZ
Cloud security vendor Lacework expands into A/NZ
Lacework expands into Australia and New Zealand, plans for growth
Les attaques par ransomware évoluent vers les environnements Linux et cloud
DevOps et SecOps doivent collaborer pour mieux innover dans le cloud
Migration vers le cloud : le chemin le plus rapide n'est bien souvent pas le plus sécurisé
Cyberkriminelle nehmen Cloud-Konten ins Visier
Monitoring vs. observability: What's the difference in DevOps?
Cloud Security Woes Give Rise to Integrated CNAP Platforms
Jay Parikh Tells Us About Why He Made The Move
Co-CEO at Lacework – Jay Parikh
Le gang ransomware Pysa cible Linux
Gang ransomware PYSA
PYSA Ransomware Gang nimmt Linux ins Fadenkreuz
Soyez prêt à répondre aux attaques des ransomwares de PYSA
New ChaChi malware variant designed to target Linux systems
Le FIC 2021 ouvre ses portes mardi matin
Comment protéger les charges de travail dans le cloud ?
Sécuriser les plateformes “modernes” de bout en bout
Le passage au cloud ouvre des perspectives aux cybercriminels, pour voler des données et obtenir un accès illicite au réseau
Cloud Security Innovator Lacework Expands in EMEA
The Wheelbarrow Effect: Cloud Security Under Pressure
Jay Parikh Rejoint Lacework Au Poste De Co-CEO
Jay Parikh joins as Co-CEO
Spécialiste de la sécurité pour le cloud, Lacework confirme donc que Jay Parikh a intégré la société au poste de co-CEO.
Talent Tracker: ECI Media Management, Lacework, Publicis Sapient and more
Jay Parikh et David Hatfield travailleront ensemble en tant que co-CEO pour développer Lacework
Jay Parikh, Former Facebook VP Joins as Co-CEO
Collaboration is Key for Cloud Innovation
As Cyberattacks Surge, Security Start-Ups Reap the Rewards
Herausforderung Container-Sicherheit: Komplexität beherrschen durch Machine Learning
Lacework mise sur la France pour son expansion européenne
Lacework, l’entreprise de sécurité du cloud révolutionnaire, annonce son expansion dans la région EMEA
Funkshau-Lacework kündigt Expansion in EMEA an
Lacework Announces Global Business Expansion Into EMEA Region
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework annonce son expansion dans la région EMEA
Lacework looks for channel support in EMEA expansion
Revolutionary cloud security company Lacework announces EMEA expansion
Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework étend ses activités dans la région EMEA
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework, L’entreprise De Sécurité Du Cloud Révolutionnaire, Annonce Son Expansion Dans La Région EMEA
Lacework, l’entreprise de sécurité du cloud révolutionnaire, annonce son expansion dans la région EMEA
Lacework scales up automated security across cloud workloads and containers
The 10 Hottest Cloud Security Startups Of 2021 (So Far)
Can Cloud Automation Solve Security Analyst Fatigue?
Endpoint security platform raises $40M
The Importance of Security Adapting To Help DevOps. CUBE Clip from RSAC 2021
Keksec Cybergang Debuts Simps Botnet for Gaming DDoS
Chaos testing and other automation tools could help cybersecurity move forward
Why your online assets aren’t safe: Is cloud the problem or the solution?
Lacework CEO spills the secret formula for successful market disruption
Top 20 Fastest Growing Cybersecurity Companies in Q1 2021
The Evolution of DevSecOps
Opportunities for DevSecOps in 2021
How Lacework Built Their Account-Based Strategy and Doubled Their Pipeline with Demandbase
Mark Ninnikhoven of Lacework speaks on the importance of security helping rather than hindering work in a DevSecOps world
10 Emerging Cybersecurity Trends To Watch In 2021
HealthTech Magazines Highlights Lacework
The 20 Coolest Cloud Security Vendors Of The 2021 Cloud 100
Lacework Lands $525M Investment as Revenue Grows 300%
Lacework Closes a $525 Million Growth Round to Scale Up Infrastructure Security for the Cloud Generation
Lacework Scores $525M in Security Battle Against Palo Alto Networks
Cloud Security Firm Lacework Raises $525 Million in VC Round
Cloud Security Provider Lacework Raises Massive $525M Growth Round
Lacework Raises $525 Million to Automate Cloud Security and Compliance
The Shared Irresponsibility Model in the Cloud Is Putting You at Risk
How These 4 Bay Area SaaS Companies Are Taking Over Enterprise Operations
Cloud Security Firm Lacework Launches New Continuous Host Vulnerability Monitoring
Cloud Security Is Not A Patchwork; How Lacework Approaches Security Differently
Lacework Adds Active Host Vulnerability Monitoring, CI/CD Integrations
Speed in Cloud Native Requires Rethinking Security
Prévisions DevSecOps 2020
6 Security Team Goals for DevSecOps in 2020
Cybersecurity Takes the Stage
VMblog Interview with Lacework at KubeCon - Platform Approach to Security
DevOps Chats: Cloud-Native Apps & Security With Lacework
Lacework, Datadog Partner on Cloud, Container Security
Lacework Adds Datadog Integration to Boost Cloud Security Monitoring
Why You Should Shift Your Cloud Security Strategy Up Stack
Lacework Integrates with Datadog to Bring Security Visibility to Cloud Monitoring
Making the Shift for a Complete Security Approach
The New Generation of Cloud Security Solutions for Enterprise DevOps Teams is Here
Primer: What Is Container Security?
Lacework 2020 Predictions: Automating Enforcement and Response in 2020
Lacework Creates Solutions for the DevOps Culture Without Leaving Security Behind
Leaky Autoclerk Database Exposes Info on Travelers
Worm Hits Docker Containers
Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS
Graboid the First Worm to be Found Hiding in Docker Hub Images
Leaving Behind Old School Security Tendencies
10 startups cool qui ont levé des fonds en septembre 2019
KubeCon 2019 Q&A: Lacework to Showcase Comprehensive Platform Approach to Security for Modern Environments at Booth S105
BSIMM 10: DevOps is Changing How Software Teams Approach Security
How Do You Adapt Security When You Move to the Cloud?
Container Security War Heats Up With $42M Lacework Investment
Cloud Security Firm Lacework Raises $42 Million
Lacework Raises $42 Million to Protect Cloud Environments From Data Breaches
Lacework Unveils New Generation Security with $42M in Funding
Cloud Security Firm Lacework Raises $42M
Lacework Secures $42 Million in Funding Round to Forge Ahead with ‘Snowflake for Security’ Plan
Coping With Security Risks, Compliance Issues Spun up by Digital Transformation
5 Limitations of Network-Centric Security in the Cloud
The 11 Top Enterprise Threat Intelligence Platforms of 2019
Moving on Up: Ready for Your Apps to Live in the Cloud?
Emerging Security Vendors To Know In 2019
Lacework: Easy-Bake Security for the Cloud-Native Developer
Top Cloud Compliance Software Tools
Dan Hubbard, Lacework CEO, on Cloud Security, Cybersec Threats, and AI in Security
An Add-On by Lacework for Sheer Security
There’s a Security Incident in the Cloud: Who’s Responsible?
What’s The Future of Cybersecurity? 38 Experts Share Their Insights
CEO Dan Hubbard of Lacework speaks on the promise he sees in Kubernetes
Shift Left for DevOps Security w/ Lacework's Dan Hubbard
Shift Left for DevOps Security with Lacework's Dan Hubbard
Lacework Announces Platform to Secure Development and Runtime Environments
Lacework Announces Complete Security Platform
Reduce Security Complexity for Cloud Architectures
Docker Hub Hack Affects 190K Accounts
8 Top Cloud Security Solutions
AWS S3 Buckets Exposed Millions of Facebook Records
Next Generation Firewalls are Old News in the Cloud
Kubernetes, Docker, ContainerD Impacted by RunC Container Runtime Bug
AWS Issues Alert for Multiple Container Systems
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Everything You Need to Know About Kubernetes
2019 DevSecOps Predictions
7 Enterprise Tech Startups to Watch in 2019
Shadow IT, IaaS & the Security Imperative
The Top 6 Cloud Security Vendors to Watch in 2019
Kubernetes Security: 4 Tips to Manage Risks
Farewell 2018, Hello 2019: The Last 12 Months in Cloud – and What’s on the Horizon
Cloud Backup: How It Can Protect Against Ransomware
Kubernetes Security Flaw Expected, Won’t Be the Last
New (and Much Needed) Emphasis on Container Security in 2019
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Cybersecurity Predictions for 2019
AWS Spot Instance and Cloud Security
Cloud, Compliance & the Death of the IT Checklist
Lacework Targets VARs, MSPs, Integrators with Global Partner Program
Lacework Introduces Global Channel Partner Program
How to Avoid Security Fails in the Public Cloud
Using the Cloud to Secure the Cloud: Moving From a Network-Centric to a Cloud-First Approach
6 Ways to Use CloudTrail to Improve AWS Security
Lightly Secured Cloud, With a Chance of IoT Attacks
Verizon Study Finds PCI DSS Compliance Falls Worldwide
Unsecured Veeam Database Reportedly Exposed Millions of Records
Veeam MongoDB Left Unsecured, 440 Million Records Exposed
Equifax Breach Still Fuzzy in the Rear-View Mirror
Container Security: From Development to Runtime
The Funded: Nearly $900M raised in Bay Area in 12 midweek deals
Lacework Raised $24 Million in Series B Funding
Lacework Raises $24 Million to Expand Cloud Security Business
Lacework Snags $24 M Series B in Sutter Hill-Led Round
Lacework Raises $24M in Funding to Improve Cloud Security
Lacework Raises $24 Million for AI-Based Cloud Security Platform
Lacework Closes $24 Million Series B Financing with Sutter Hill Ventures
Cloud Security Company Lacework Closes $24M Series B
Lacework Raises New Funds To Help Extend Cloud Security Capabilities
Lacework Obtains $24 Million in Latest Round of Financing
Lacework Raises $24 Million to Expand Cloud Security Business
Voting Security: Suggestions to Protect Our Elections
Why Container Orchestration Platforms Risk Data Exposure
Add This to the List of 'New' Malware Types You Need to Look Out For: Snail Mail
Hacking Elections: Georgia's Midterm Electronic Voting in the Dock
Congressional Campaign Websites Vulnerable to Attack, Say Researchers
Container Security Tools Pump up the Platform
Security Incident at Reddit Exposed User Data to Hackers
Spectre: The Vulnerability That Just Keeps on Giving
NetSpectre Attack Could Enable Remote CPU Exploitation
Lacework’s Three Keys for Effective AWS Security
A Dash of Security: Locking Down Kubernetes Admin Access to Thwart Crytojacking
The Weight of GDPR, Widespread Retail Breaches, Cloud Worries, More Venture Investment
IT Trends for the Remainder of 2018
Over 20,000 Container Management Dashboards Are Exposed on the Internet
Container Orchestration Systems at Risk by Being Web-Accessible
Lacework Warns of Unsecured Container Orchestration Dashboards
Lacework Finds Thousands of Vulnerable Kubernetes Deployments
Researchers Find 21,000 Exposed Container Orchestration Systems
Risks of Operating Workloads in the Cloud
Exposed Container Orchestration Systems Putting Many Orgs at Risk
Early Container Deployments at Risk, Survey Finds
Lacework Study Highlights Software Container Vulnerabilities
Lacework Study Finds 300 Unsecured Container Orchestration Dashboards
Kubernetes Skills Demand Continues to Soar – But are Organisations Dropping the Ball on Security?
Inside the Legislative and Regulatory Minefield Confronting Cybersecurity Researchers
Top 10 Cybersecurity Tips to Secure the 2018 U.S. Election
Martech Spending in 2018: What CIOs Need to Know
Operation Prowli Malware Infected 40,000 Machines
Lacework: Avant-Garde Security
More Data Leaked from AWS Bucket Misconfigurations
The Top Tools to Support DevSecOps
Moving to the Cloud: Too Many Companies, Too Fast?
Lacework Automates Veeva Systems Security and Compliance for its AWS Cloud
The 5 Gartner Cool Vendors in Cloud Security
Top 3 AWS Configuration Must-Dos for DevSecOps
A Guide: How to Apply the NIST Cybersecurity Framework to AWS Implementations
Best Security Software: How 9 Cutting-Edge Tools Tackle Today's Threats
Containers in the Cloud: From Top Hazards to First-Class Cloud Security Citizen
20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA
Avoiding Holes in Your AWS Buckets
The Malicious Use of Artificial Intelligence in Cybersecurity
Lacework Polygraph Prevents Bitcoin Mining on AWS
New Attack Vectors Brought by the Cloud and AWS
Balancing Velocity and Security in the Cloud
2018 Security Predictions
Best Security Software: How 5 Cutting-Edge Tools Tackle Today’s Threats
Security vs. Speed: The Risk of Rushing to the Cloud
The Importance of Getting Security On-Board Early in Cloud Projects
Innovative Organizations Build Security Into Their Cloud Strategy
Best security software: How cutting-edge tools tackle today's threats
Key Questions any CEO Should ask Before Moving to the Cloud
Major Intel CPU Flaw OS-Independent; Fix Could Degrade Performance
Confronting Cloud Security Challenges in 2018
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
2018 Security Predictions
InfoSec Professionals Reveal the Top Information Security Concerns for 2018 & Beyond
Spotting Attackers Early Means Being More Protected
5 Free Cyber Security Tools You Should Know
Is Fake News Dangerous? Security Pros Say Yes
Lacework Enhances Data Protection Capabilities to Enable AWS Users to Identify S3 Buckets at Risk
Lacework Can Now Identify Leaky S3 Buckets
Top Security Tools, 2017: How Cutting-Edge Products Fare Against the Latest Threats
6 Hard Truths IT Must Learn to Accept
Hybrid IT and Cybersecurity Drive Disruption at VMworld
Communiqué de presse
Niels Provos Joins Lacework as Head of Security Efficacy
Lacework Helps Customers Achieve Greater Security Visibility with Amazon Security Lake
Lacework Appoints Andrew Casey as Chief Financial Officer
Lacework Recognized by Frost & Sullivan as Leader in Innovation and Growth for Cloud-Native Application Protection Platform (CNAPP)
Former MongoDB and TripActions CMO Meagen Eisenberg joins Lacework as Chief Marketing Officer
Lacework étend les capacités CNAPP avec l'analyse des canaux d'attaque et l'analyse des workloads sans agent
Lacework Extends CNAPP Capabilities with Attack Path Analysis and Agentless Workload Scanning
Lacework Named to CNBC’s 2022 Top Startups for the Enterprise
Lacework Brings Its CNAPP Solution To Google Cloud’s Chronicle Security Operations
Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report
Clariness Selects Lacework to Future Proof Cloud Security
Lacework and Avenue Bank partner to build cutting edge cloud foundation for launch
Lacework Named To The Forbes Cloud 100
Lacework Strengthens Threat Detection To Uncover More Malicious Activity and Speed Investigation at Scale
Lacework Helps Customers Innovate with Confidence On AWS
Lacework Announces Expanded Workload Security To Cover More Environments, Including Support for Windows Servers
Lacework Adds New Agentless Scanning to Uncover Vulnerability Risks in Cloud-Native Workloads
Lacework intègre des fonctionnalités de Kubernetes pour renforcer la sécurité dans les environnements multi-clouds
Lacework Named to the 2022 CNBC Disruptor 50 List
Lacework Labs Cloud Threat Report Identifies Most Exploited Vulnerabilities Targeting Businesses In the Cloud
Lacework Announces Support for AWS for Games
Lacework Hires New Partner Leader, Building on Recent Partner Momentum
Lacework Ranked #6 on Forbes America’s Best Startup Employers List
Lacework Partners with Google on Cloud Security and Announces Investment from GV
Lacework Enhances Partner Program to Better Enable Cloud Service Providers, Alliance Partners and the Channel
Lacework Introduces Polygraph® Data Platform
Lacework Welcomes Jesper Frederiksen as General Manager for EMEA
Lacework Introduces New Free Cloud Care Program to Aid in Industry Fight Against Log4j
Lacework Raises $1.3 Billion at $8.3 Billion Valuation
Lacework Strengthens Data-Driven Cloud Security Platform with Acquisition of Infrastructure as Code Company Soluble
Lacework et Snowflake s'associent pour proposer des analyses et insights de cloud security plus qualitatives
Lacework® expands into ANZ market to empower security and developer teams with a simpler, smarter cloud security platform
Lacework Customer Momentum Soars Globally as Attackers Continue to Target Cloud Environments
Lacework Quarterly Cloud Threat Report Shows the Automated Techniques Cybercriminals are Using to Attack Businesses in the Cloud
Jay Parikh, Former Facebook VP, Head of Engineering and Infrastructure, Joins Lacework as Co-CEO
Lacework, l’entreprise de sécurité du cloud révolutionnaire, annonce son expansion dans la région EMEA
Revolutionärer Cloud-Sicherheitsanbieter Lacework kündigt Expansion in EMEA an
Lacework, l’entreprise de sécurité du cloud révolutionnaire, annonce son expansion dans la région EMEA
Lacework Announces Continued Explosive Growth
Lacework Expands Security, Visibility and Automation Across Amazon Web Services
Lacework Expands Leadership Team with Key New Hires, Including David “Hat” Hatfield as Chief Executive Officer
Lacework Announces Mike Staiger as CFO
Lacework Closes a $525 Million Growth Round to Scale Up Infrastructure Security for the Cloud Generation
Lacework Helps to Support the Launch of Professional Services in AWS Marketplace
Lacework Expands “Accelerate” Partner Program for Cloud Generation of Technology and Services Partners Building Secure Software Businesses
Lacework Adds Active Host Vulnerability Monitoring and CI/CD Integrations as Demand for Unified SaaS Cloud Security Solution Surges
Lacework Integrates with Datadog
Lacework Closes $42 Million Financing Round and Adds Cloud Security Leader Andy Byron as President
Lacework Announces Complete Security Platform to Secure Development and Runtime Environments
Security Industry Veteran Dan Hubbard Named CEO of Lacework
Lacework Extends Multicloud Support with Workload and Account Security for Google Cloud Platform
Lacework Announces Comprehensive Security Support for Azure and Multicloud Environments
Lacework Names Johnny Chen as Vice President of Engineering
Lacework Announces Kubernetes Support in End-to-End Cloud Security Platform
Lacework Achieves AWS Security Competency Status
Lacework Introduces Global Channel Partner Program
Lacework Achieves SOC 2 Type II Compliance
Lacework Closes $24 Million Series B Financing With Sutter Hill Ventures to Expand Go-to-Market for Game-Changing Cloud Security Solution
Lacework Selected by Brightcove for Automation of Security at Scale for Its AWS-Hosted Video Service
Lacework Helps Veeva Systems Automate Security and Compliance for its AWS Cloud
Lacework Named a Gartner Cool Vendor in Cloud Security for 2018
New Cloud Operating Model Fuels Adoption of Lacework Automated Security and Compliance Solution
David Hatfield Joins Lacework’s Board of Directors
Hurwitz & Associates: Leaders Find Winning Cloud Security Strategy in Automation
Lacework Announces New Capabilities Enabling AWS Customers to Rapidly Implement Security Best Practices and Proactively Identify S3 Buckets at Risk
Lacework Names Dan Hubbard Chief Security Architect
Lacework Names Stefan Dyckerhoff Chief Executive Officer
Lacework Adds File Integrity Monitoring to its Cloud Security Platform
Lacework Recognized in Independent Cloud Workload Security Solutions Vendor Landscape Report
Lacework Brings Zero-Touch Anomaly Detection to AWS Accounts
Lacework’s Partnerships and Integrations Establish Foundation of New Cloud Security Stack
Lacework Executives to Present at CyberSecurity International Symposium and SANSFIRE 2017
Lacework Announces 14–Day Free Trial of Zero-Touch Cloud Workload Protection Platform (CWPP)
Lacework Selected to 2017 Red Herring Top 100 North America
Lacework Adoption Spikes, Protects More Than 50,000 Instance-Hours Per Day in First Month on the Market
Lacework to Showcase Industry’s First Zero-Touch Cloud Workload Security Platform at Gartner Security & Risk Management Summit
Lacework Launches with the Industry’s First Zero-Touch Cloud Workload Security Platform
RESSOURCES
Learn how to build custom policies
Cloud security posture management (CSPM)
Inside Lacework: Agentless Workload Scanning
Lacework Product Leader Explains Attack Path Analysis with Exposure Polygraph
Inside Lacework: Attack Path Analysis with Exposure Polygraph
Broaden vulnerability coverage Lacework Agentless Workload Scanning
Speed investigations with Lacework Attack Path Analysis
Attack path analysis
Frost Radar™ : Global CNAPP, 2022
Kubernetes in the Enterprise: Container Management Reimagined
Built for the cloud: automated, comprehensive compliance and security
Shifting security left to scale security for modern software development
Cryptojacking 101: What it is, why it matters, and how to respond
The evolution of cloud threats and defenses
Cloud Threat Report, Vol. 4
Fixing Vulnerabilities
Vulnerability management for startups and small businesses
IDC Tech Assessment: Vendor Assessments are Key to Unlocking Cloud Security Benefits
Avenue Bank builds a business — and a security discipline — from the ground up
Why Lacework for FinTech
Detect and expose cyber threats: A fireside chat with Eric O'Neill
Geo-analytics firm Kayrros uses Polygraph to protect the most precious of data
The Rise of Containers: Tackling the Security Challenge
Enhancing security for Sleepme’s IoT platform with Defiance Digital
Cryptojacking 101
Walking the Line: GitOps and Shift Left Security
5 ways fintech security teams can protect digital trust
Built for the cloud: automated compliance and security for startups and small businesses
Simple cloud compliance for startups and small businesses
Clariness uses Lacework to gain the visibility needed to drive action and streamline compliance
Dreem gains insight into infrastructure and protects customer health data
Swimlane transforms compliance processes and vulnerability management with actionable insights
LendingTree
How to reduce security risks in the cloud
Forrester Research: Best Practices: Kubernetes
Securing data means securing lives
Greenlight Guru optimizes its regulatory compliance on AWS with Lacework
Preventing and Recovering from Ransomware Before It's Too Late
Lacework data collection: an agent approach
Agentless workload scanning
Getting Started with IaC
A Closer Look at the Lacework Polygraph® Data Platform
Boîte à outils pour la sécurité des containers
Visite guidée sur l'automatisation de la conformité SOC 2
Achieving HIPAA compliance
Protect Your Cloud Environment from Ransomware
10 bonnes pratiques de sécurité pour Kubernetes
Achieving NIST SP 800-190 compliance
Comprehensive and automated Kubernetes security and compliance
TEI Spotlight shows 342% ROI with Lacework cloud security
The benefits of anomaly detection for the cloud
Protegrity renforce les mesures de conformité et offre une meilleure visibilité des environnements multicloud
Rapport sur les menaces du cloud, Volume 3
Clariness réorganise la conformité de la sécurité informatique
Automated, Comprehensive Compliance and Security
Simplifying security for multicloud and hybrid environment
Guide sur la sécurité des containers
Forrester Research: The State of Ransomware Attacks and Defenses
Lacework Field CTO Nicholas St. Pierre on the Security Architecture Podcast
Increasing visibility and automating security for ActivePipe
Comment lutter contre les ransomwares dans le cloud
Infrastructure as Code (IaC) security
Exploiter la puissance des données pour automatiser la sécurité du cloud
Achieving PCI DSS Compliance
Optimize Your Cloud Strategy
Cloud Threat Report, Vol. 3
Principales menaces et tendances dans la sécurité du cloud en 2022
Secure Your Gaming Development Pipeline with Lacework and AWS
With Lacework, Snowplow secures their multicloud environments and protects against Log4j
Buyer's Guide for cloud security platforms
Pocket Gems protège les données des clients et facilite la détection des vulnérabilités
Avec ou sans agent : protégez votre cloud grâce à une stratégie multicouche
Gestion des vulnérabilités pour le cloud computing
Maximize Your Cloud Security ROI in 2022 Featuring Forrester's Total Economic Impact™ of Lacework
Game on: Don’t play around with cloud security
Charting The Course for Cybersecurity
Simplify AWS security for small businesses
Infographic: The Total Economic Impact™ of Lacework
L’Australie et la Nouvelle-Zélande adoptent la stratégie DevSecOps
Anomaly Based Cloud Threat Detection
11 Reasons to Level up Against Cyber Threats
Sliide pour gérer les vulnérabilités et prouver la conformité
Hello CNAPP: Merging CSPM and CWPP
Cloud security automation & compliance for hypergrowth startups
La plateforme de données Polygraph® : protéger de manière proactive les environnements cloud en fonction des besoins
Gartner® Predicts 2022 : Consolidated Security Platforms Are the Future
Perspectives sur la sécurité du cloud 2022, volume 1
Achieving SOC 2 compliance with Lacework
Quand la plateforme de sécurité axée sur les données rencontre le Data Cloud
La puissance combinée de Lacework et de New Relic
Achieving ISO 27001:2022 Compliance
Simplifier la sécurité pour Google Cloud
Simplifier la sécurité pour Microsoft Azure
Simplifier la sécurité pour AWS
AWS Control Tower Solution Brief
AB Tasty utilise Lacework pour assurer sa conformité, améliorer la visibilité et intégrer la sécurité au développement.
Lacework permet à Molecular Health d'obtenir une meilleure visibilité de son infrastructure et de son environnement
Five Ways to Optimize Your SIEM with Lacework
Forrester Consulting Total Economic Impact™
Scurri double la productivité de son équipe de sécurité et acquiert de nouveaux clients en faisant preuve de conformité
Guide pour remédier à la vulnérabilité dans Log4j
Comprendre la vulnérabilité de Log4j
Les considérations à prendre en compte pour la gestion de la conformité en environnements Cloud
Nylas se protège rapidement de la vulnérabilité dans Log4j
Conformité des configurations : la visibilité et l'analyse de la conformité au service des environnements multi-cloud
Identifiez et gérez les erreurs de configuration de la sécurité du cloud dans AWS, Azure et GCP
Snowflake
HP Enterprise
Un tournant décisif dans la sécurité du cloud
L'avenir de la sécurité du cloud
Shift-Left DevSecOps with Atlassian, AWS & Lacework
Shift Left Faster: Infrastructure as Code (IaC) Security For the Win
Lacework favorise la protection contre les attaques par ransomware dans le cloud
Cloud Threat Report, Vol. 2
Hypergiant respecte ses frameworks de conformité, consolide ses outils et réduit son nombre d'alertes de 70 %
Hypergiant tire parti de Lacework pour une meilleure visibilité
Trois concepts essentiels pour la sécurité dans l'infrastructure as code
A Look Inside Lacework's Revolutionary Polygraph®
The Essentials To Scaling Your SIEM
Reltio tire parti de Lacework pour consolider ses outils, obtenir une visibilité approfondie et traiter les alertes 4 fois plus rapidement
CallTrackingMetrics gagne en visibilité et en sécurité grâce à Lacework et AWS
The ABCs of Cloud Security
New Relic Solution Brief
Presidio and Lacework Partnership
Présentation de la solution Snowflake
Hypergiant and Lacework
Étude de cas vidéo : Hypergiant
Cloud Threat Report 2021, Volume 2 Review
Reckless to Fearless: Automating Remediation in the Cloud
Comment Lacework détecte les anomalies
Comment VOS données peuvent contribuer au succès de la sécurité du cloud à grande échelle
How the Cloud Breaks Traditional Security Approaches
Les fondamentaux de la sécurité des containers
Behaviors of Compromised Cloud Environments
Lacework Cloud Threat Report, 2021 Volume 1 Review
Principes fondamentaux de la sécurité du cloud
Achieve Cloud Security Cost Savings Through SIEM Optimization
Tevora: Simplify Continuous Compliance and SOC 2
Achieve Cloud Security Savings through SIEM Optimization
Transformer les données AWS en informations sur la cloud security
LendingTree Automates AWS Security for DevOps Teams and Stays Compliant with Lacework
Solving M&A Challenges with Cloud Security
Économisez 40 % sur votre infrastructure cloud avec AWS Graviton2
Top 5 Strategies to Balance Container Advantages and Risks
Cloud Threat Report, Vol. 1
Addressing Compliance and Audit Challenges in the Cloud
7 Key Considerations Before Sending AWS CloudTrail Logs to a SIEM
Comment relever les défis de la sécurisation du cloud et des containers ?
Réduisez le temps d'analyse AWS Security de 90 %
Protecting Your AWS Environment with Ease
Secure Modern Cloud Applications and Infrastructure
How to Accelerate Container Adoption
Optiv
Observian
Drift améliore la visibilité et la sécurité dans le cloud AWS tout en atteignant ses objectifs de croissance et de conformité avec Lacework
Simplify compliance for the cloud
Gaining Complete Cloud Visibility as You Scale
Top Mistakes to Avoid When Using Cloud Provider Security Tools
Why Compliance is Not Enough When it Comes to Cloud Security
The Journey to Mature Cloud Security
Cloud Security for Health IT
Poka gagne en visibilité sur les containers avec un contexte applicatif complet
Marqeta favorise une ingénierie des applications plus rapide et une sécurité renforcée
Awards Are Nice But Our Focus Is Great Software
AWS CloudTrail Solution Brief
Top Ways Your Cloud Approach is Burning Cash
Carson Living secures rapidly growing cloud environment with Lacework
DataVisor renforce la sécurité et la conformité multi-cloud de ses clients grâce à Lacework
Rules Optional Ep. 2 | San Francisco
Rules Optional Ep. 1 | San Jose
Jitterbit secures dynamic cloud environments, containers, and microservices at scale with Lacework
CISO's Playbook to Cloud Security
The Cube AWS re:Invent 2019
Cazena secures massive cloud data lakes with Lacework
Vikram Kapoor at KubeCon + CloudNativeCon 2019
Lacework Live from AWS re:Inforce 2019
How to Build a DevSecOps Culture
Why Cloud Native, API Centric Applications Require Built-In Security
The Cube Interview with Lacework CEO, Dan Hubbard
Working at Lacework
Prévenir les fuites de données dans le cloud avec la détection d'anomalies
Lacework Live from Black Hat 2019
Outils de sécurité pour les déploiements multi-cloud
Le rôle de Kubernetes dans la sécurité du cloud
Lacework Shifts Left for DevOps Security
Lacework Tap Talk: Lacework Shifts Left
Lacework Tap Talk: Platforms vs. Products
Guide sur la sécurité de l'orchestration des containers
Automating Security for Cloud Workloads
Lacework Demo: Gain Visibility & Protect Your AWS, Azure, and GCP Clouds
Lacework Product Demo
Sécuriser les containers dans un environnement cloud
Resetting Your Security Thinking for the Public Cloud
Inside Lacework: Kubernetes and Google Cloud Platform
Workload Security
Container Security
Google Cloud Security
Azure Security
AWS Security
Détection des intrusions
Défense contre les menaces dans le runtime
Surveillance de l'intégrité des fichiers
Sécurité de Kubernetes
Cloud Account Security
Conformité de la configuration
Détection des anomalies
Lacework for Azure & Multicloud Environments
Latest Kubernetes Product Features at KubeCon
Flatiron Health
Au cœur de Lacework : Introduction à la sécurité des workloads
Inside Lacework: Set Up Lacework with AWS
Lacework Cloud Workload Security
Guide
Guidebook gains visibility, cross-functional versatility and effective protection with Lacework and AWS solution
Expanding Security Operation Center Coverage to the Cloud
Lacework Host-Based Intrusion Detection Solution (HIDS)
Wavefront secures DevOps environments at scale with Lacework
Snowflake gains end-to-end visibility into their environment with Lacework Polygraph
Lacework File Integrity Monitoring
Insider Threat Management
Breach Detection
Lacework Compliance to CIS Benchmark for AWS
Lacework AWS S3 Bucket Protection
Grande entreprise de réseau
Profiles
Récompenses
Partner Categories
Partner Area
Resources Types
Resources Tags
Profiles