Blog

Blog
May 20, 2022
Security Advisory: Critical vulnerabilities in VMware

Blog
May 17, 2022
Lacework introduces new Kubernetes Audit Logs monitoring

Blog
May 17, 2022
Lacework joins the CNBC Disruptor 50 List

Blog
May 16, 2022
Balancing small team demands with the need for cloud visibility

Blog
May 13, 2022
Lacework goes to FutureStack

Blog
May 12, 2022
Malware targeting latest F5 vulnerability

Blog
May 12, 2022
Lacework at Kubecon + CloudNativeCon Europe 2022

Blog
May 10, 2022
How developers can prevent bad actors

Blog
May 5, 2022
What Is cloud security?

Blog
May 3, 2022
Lacework CEOs and Presidio discuss cloud security

Blog
April 29, 2022
Cybersecurity and breach regulations - Are you ready?

Blog
April 26, 2022
Securing your supply chain

Blog
April 19, 2022
Using machine learning to solve your business problems

Blog
April 15, 2022
NginxDay

Blog
April 12, 2022
Prevent cybersecurity burnout

Blog
April 6, 2022
Ten tips for building a vulnerability management pipeline

Blog
April 5, 2022
The OAST with the most

Blog
March 31, 2022
Actionable threat intel in the cloud

Blog
March 29, 2022
New Lacework report reveals increase in sophisticated cloud attacks

Blog
March 23, 2022
Achieving SOC 2 compliance with Lacework

Blog
March 22, 2022
Heightened cyber threats have everyone on edge, what do you need to know?

Blog
March 17, 2022
Forrester Consulting Study finds Lacework generated 342% return on investment

Blog
March 16, 2022
Gaming and cloud security, don’t get played

Blog
March 11, 2022
Lacework named only security company in top-10 of Forbes’ Best Startup Employers

Blog
March 10, 2022
The role software developers play in the cybersecurity space

Blog
March 8, 2022
Elevate your cloud security knowledge with Lacework Academy & Community

Blog
March 7, 2022
Celebrating International Women’s Day

Blog
February 24, 2022
A guide to responding to the Log4j vulnerability

Blog
February 16, 2022
Why visibility and permissions are key to Kubernetes security

Blog
February 10, 2022
Top 5 security incidents of 2021

Blog
February 7, 2022
Identifying active vs. dormant Log4j vulnerabilities

Blog
February 3, 2022
Lacework continues investment in partner ecosystem

Blog
February 2, 2022
Lacework Partners with Google Cloud

Blog
February 2, 2022
Shining a new light on security in the cloud era

Blog
January 28, 2022
Evaluate your cybersecurity posture for Data Privacy Day

Blog
January 26, 2022
Log4j Today - Prepare for What’s Next
Ready to see us in action?
Spot unknowns sooner and continuously watch for signs of compromise. Take us on a test drive to see for yourself.