Blog

Five Steps to Effective Container Security

5 Steps to Achieve Effective Container Security

Container security is a critical, but often under appreciated element of operating a rapid, DevOps approach to application development and deployment. Containers are rapidly becoming the go-to method for streamlining software development for innovative organizations of all sizes and IT budgets. Yet, in order to balance their inherent advantages with container-specific risk, companies must combine […]

Read More…

Introducing Asset Discovery for AWS Environments

With the explosive growth of cloud activity, and the ephemeral nature of applications running in the cloud, it has become increasingly difficult to maintain visibility. Twitter is full of AWS users lamenting about the difficulties of identify cloud assets and tracking how they have changed over time. But if you don’t know what applications and […]

Read More…

ESG

Introducing Secure, Automated IaC Deployments with Terraform  

Automation is key to achieving true scale, and cloud security is no exception. Cloud innovators  are increasingly deploying their workloads using Infrastructure as Code (IaC), and they are also looking for ways to automate the deployment of their security tools.  Tackling the Problem of Modern Cloud Security at Scale  Lacework has released comprehensive Terraform modules […]

Read More…

Expanding Security, Visibility, and Automation Across AWS Environments

Lacework, the security platform for the cloud generation, has announced that it has extended native security support for Amazon Web Services (AWS) services including AWS Graviton2 and AWS Fargate. These additions give Lacework customers using AWS in-depth security visibility, threat detection, configuration compliance, and context into cloud security data and changes for all compute types: […]

Read More…

Introducing Container & Workload Security for AWS Fargate

AWS Fargate is a serverless compute engine that allows organizations to run containers at scale, without needing to worry about provisioning and managing servers. This allows them to focus on building applications, so it’s no wonder that Fargate runs on nearly 1/3 of all AWS container environments. However, much like other cloud services, AWS is […]

Read More…

The Cloud Security Evolution: From Point Products to Platforms

The evolution in cloud security is well underway, as enterprises shift from point products to platforms as the most effective way of securing their cloud workloads and delivering innovation at record speed. This is truly the digital transformation that has been hyped over the past few years, and for those organizations using AWS, GCP, or […]

Read More…

ESG

AWS CloudTrail Best Practices, SIEM, and Lacework

Security and the move to the Cloud A cornerstone of comprehensive cybersecurity programs is the ability to operationalize log data, such as alerting, reporting, or automation. Traditionally, this meant logging servers, firewalls, directories, intrusion prevention, and related tooling to your Security Information and Event Management (SIEM) platform of choice and hiring a dedicated team to […]

Read More…