Blog

Blog
August 9, 2022
A short pause along the path to celebrate being on the Forbes Cloud 100

Blog
August 9, 2022
Time series model brings another dimension of analysis, uncovering cryptomining threats

Blog
August 9, 2022
Powerful Lacework alerting overhaul helps teams act faster, together

Blog
August 8, 2022
ESG reveals developer security priorities in new study

Blog
August 4, 2022
The one piece of advice that most AWS re:Inforce presenters agreed on

Blog
July 27, 2022
Sleeping through AWS Cloud compliance meetings? You are not alone

Blog
July 26, 2022
Lacework drives customer innovation with confidence on AWS

Blog
July 26, 2022
My hope for the AWS re:Inforce 2022 keynote

Blog
July 25, 2022
Will breakthrough security technology solve the next big art heist or make it worse?

July 22, 2022
How to guarantee your time is well spent at AWS re:Inforce

Blog
July 21, 2022
Identifying detection opportunities in cryptojacking attacks

Blog
July 19, 2022
The types of sessions at an AWS conference and why they matter

Blog
July 18, 2022
ISO 27001 update gives a cloud callout to help you build your security practice

Blog
July 15, 2022
How Watchdog smuggles malware into your network as uninteresting photos

July 14, 2022
Increasing multicloud visibility and enabling innovation, from gaming to healthtech

Blog
July 13, 2022
What is visibility and why it’s important to cloud security

Blog
July 12, 2022
Are cybercriminals lazy or brilliant for selling your passwords instead of using them?

Blog
July 7, 2022
Security is one pillar of building in the cloud, not the only one

Blog
July 5, 2022
Healthcare: Where cloud security can save lives

Blog
June 28, 2022
ClearPath report shows automation and good policy can help beleaguered security professionals

Blog
June 21, 2022
Kubernetes tools are helpful for your team and sadly, your attacker

Blog
June 14, 2022
Ransomware hits the cloud

Blog
June 7, 2022
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134

Blog
June 3, 2022
Four tips for attending RSA Conference 2022

Blog
June 3, 2022
Security Advisory: CVE-2022-26134 RCE in multiple Atlassian products

Blog
June 2, 2022
More flexibility and visibility with agentless coverage for workloads

Blog
June 2, 2022
Lacework expands workload security capabilities to protect Windows Server

May 26, 2022
New integration with Kubernetes admissions controller

Blog
May 25, 2022
Lacework Update

Blog
May 24, 2022
Embed IaC security at the earliest stage in development

Blog
May 20, 2022
Security Advisory: Critical vulnerabilities in VMware

Blog
May 17, 2022
Lacework introduces new Kubernetes Audit Logs monitoring

Blog
May 17, 2022
Lacework joins the CNBC Disruptor 50 List

Blog
May 16, 2022
Balancing small team demands with the need for cloud visibility

Blog
May 13, 2022
Lacework goes to FutureStack

Blog
May 12, 2022
Malware targeting latest F5 vulnerability
Ready to see us in action?
Spot unknowns sooner and continuously watch for signs of compromise. Take us on a test drive to see for yourself.