ClearPath report shows automation and good policy can help beleaguered security professionals
Kubernetes tools are helpful for your team and sadly, your attacker
Ransomware hits the cloud
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134
Four tips for attending RSA Conference 2022
Security Advisory: CVE-2022-26134 RCE in multiple Atlassian products
More flexibility and visibility with agentless coverage for workloads
Lacework expands workload security capabilities to protect Windows Server
New integration with Kubernetes admissions controller
Embed IaC security at the earliest stage in development
Security Advisory: Critical vulnerabilities in VMware
Lacework introduces new Kubernetes Audit Logs monitoring
Lacework joins the CNBC Disruptor 50 List
Balancing small team demands with the need for cloud visibility
Lacework goes to FutureStack
Malware targeting latest F5 vulnerability
Lacework at Kubecon + CloudNativeCon Europe 2022
How developers can prevent bad actors
What Is cloud security?
Lacework CEOs and Presidio discuss cloud security
Cybersecurity and breach regulations - Are you ready?
Securing your supply chain
Using machine learning to solve your business problems
Prevent cybersecurity burnout
Ten tips for building a vulnerability management pipeline
The OAST with the most
Actionable threat intel in the cloud
New Lacework report reveals increase in sophisticated cloud attacks
Achieving SOC 2 compliance with Lacework
Heightened cyber threats have everyone on edge, what do you need to know?
Forrester Consulting Study finds Lacework generated 342% return on investment
Gaming and cloud security, don’t get played
Lacework named only security company in top-10 of Forbes’ Best Startup Employers
The role software developers play in the cybersecurity space
Ready to see us in action?
Spot unknowns sooner and continuously watch for signs of compromise. Take us on a test drive to see for yourself.