Blog

Enhancing Native Kubernetes Security

By 2022, 75% of enterprises (a sharp rise from 30% in 2019) are expected to run containerized applications globally. The visible benefits of automating container orchestration with Kubernetes is a key force behind this rapid adoption. Unfortunately, this also increases risks as a compromise in Kubernetes can potentially impair the entire containerized environment.  The hyper-dynamic […]

Read More…

Lacework Threat Detection in Cloud Environments: A Quick Guide

There’s an enormous amount of event activity in the cloud. A busy cloud environment can generate eight to ten billion events per month, which makes threat detection a challenge. Moreover, in the cloud where ephemeral servers and containers come and go on-demand, malicious activity can escape detection unless the visibility into events and behaviors is […]

Read More…

How Capital One Illustrates the Need for Cloud Configuration Visibility

How Capital One Illustrates the Need for Cloud Configuration Visibility

By now, we all know the story – the personal data of 106 million Capital One card customers and applicants was accessed by a hacker, making it one of the largest data breaches of a financial institution. We’re already seeing a cottage industry being built around “what’s in your wallet” memes, and just when the […]

Read More…

Lacework Labs Upcoming Speaking Events

The first half of the year was a busy one for Lacework Labs. We had the pleasure of speaking at a number of amazing conferences and meetups to include ACoD, BSidesSF, RSA, and more. If you didn’t get the chance to see us speak on various cloud security topics, here are a couple of upcoming […]

Read More…

Cloud Security Incident Response: Continuous vs. Emergency Approaches

Continuous monitoring and behavior analysis is essential to identifying vulnerabilities that exist within an organization’s environment. The monitoring solution should be able to identify anomalies for every activity happening within a cloud environment by baselining, and then analyzing, the actions of applications, networks, users, and all the different types of resources being used. By doing […]

Read More…