Search Results
Results For:
5 Steps to Achieve Effective Container Security
Container security is a critical, but often under appreciated element of operating a rapid, DevOps approach to application development and deployment. Containers are rapidly becoming… Read More
Read MoreIntroducing Asset Discovery for AWS Environments
With the explosive growth of cloud activity, and the ephemeral nature of applications running in the cloud, it has become increasingly difficult to maintain visibility. Read More
Read MoreIntroducing Secure, Automated IaC Deployments with Terraform
Automation is key to achieving true scale, and cloud security is no exception. Cloud innovators are increasingly deploying their workloads using Infrastructure as Code (IaC),… Read More
Read MoreExpanding Security, Visibility, and Automation Across AWS Environments
Lacework, the security platform for the cloud generation, has announced that it has extended native security support for Amazon Web Services (AWS) services including AWS… Read More
Read MoreIntroducing Container & Workload Security for AWS Fargate
AWS Fargate is a serverless compute engine that allows organizations to run containers at scale, without needing to worry about provisioning and managing servers. This… Read More
Read MoreThe Cloud Security Evolution: From Point Products to Platforms
The evolution in cloud security is well underway, as enterprises shift from point products to platforms as the most effective way of securing their cloud… Read More
Read MoreAWS CloudTrail Best Practices, SIEM, and Lacework
Security and the move to the Cloud A cornerstone of comprehensive cybersecurity programs is the ability to operationalize log data, such as alerting,… Read More
Read More