Blog

Cloud Security This Week – October 26, 2018

  New from Lacework Security Table Stakes: A Blueprint for Securing Your Cloud Environment It’s important for a security strategy to pay attention to the different pieces of the cloud stack and address their unique security needs with the following approach and actions.   Webinar Replay: Prevent Cryptocurrency Mining in Your AWS Account Learn why […]

Read More…

Cloud Security This Week - October 12, 2018

Cloud Security This Week – October 12, 2018

  New from Lacework Network Security Vendors Are Trying to Buy Their Way Into Relevance Consolidation, investment, and acquisition in the security market is a great validation that demand for the cloud continues at a breakneck pace. But it’s not necessarily making customers safer.   Inside Lacework: Set Up Lacework with AWS We cover how […]

Read More…

In the news - cyberattacks or the discovery of a breach of sensitive data.

I Read the News Today, Oh Boy

Photo by Flemming Fuchs on Unsplash Every morning, I begin my day with the same routine I’ve had for many years. You and I aren’t that close yet, so I won’t go into the specifics of my dawn activities, but I can safely divulge that it involves fleece, coffee, and a quick scan of the […]

Read More…

Privilege Escalation and a Proposal for Acceptable Exclusion

Privilege Escalation and a Proposal for Acceptable Exclusion

Photo by Annie Sowards on Unsplash “I’d never join a club that would allow a person like me to become a member.” — Woody Allen Social concepts about exclusivity and inclusion have changed over the last 50 years. It used to be common for social and professional clubs to aggressively seek homogeneity among their membership and exclude […]

Read More…

Lacework Supports PCI Compliance with FIM Solution

Lacework Supports PCI Compliance with FIM Solution

Photo by Samuel Zeller on Unsplash If you wanted to name a technology product category so it got beat up in the schoolyard, you might call it File Integrity Monitoring. Like a lot of products in the security space, File Integrity Monitoring (FIM) as a moniker accurately explains what the solution provides, but it’s about […]

Read More…

Lacework Kubernetes Meetup

Kubernetes, Pizza, and Learning From Our Community

  Yesterday was a big day for Lacework. We announced a $24 million series B round of funding which will help us continue our momentum in building the market’s most comprehensive cloud security solution. Even in today’s funding environment, that’s a significant amount, and we already have plans to invest heavily (and wisely) in product development, […]

Read More…

PCI Compliance for cloud environments: Tackle FIM and other requirements with a host-based approach

PCI Compliance for Cloud Environments: Tackle FIM and Other Requirements With a Host-Based Approach

Photo by Hannes Egler on Unsplash Compliance frameworks and security standards are necessary, but they can be a burden on IT and security teams. They provide structure, process, and management guidelines that enable businesses to serve customers and interoperate with other organizations, all according to accepted guidelines that facilitate a better experience for end users. […]

Read More…

We just looked at 2 billion #cloud events

I Just Looked at 2 Billion Cloud Events. Here’s What I Found.

Photo by Jase Ess on Unsplash Our relationship with Lacework customers usually starts with a 30-day trial of our solution. Going in to it, they typically acknowledge lack of necessary visibility into their cloud environment. They also, however, tend to massively discount the reality of threats and risks to which they’re exposing their users and data. It’s not […]

Read More…

Security Can’t Start Until Multi-Factor Authentication is Turned On

Passwords have long been a target for cybercriminals since they became necessary for switching between users on computers, validating a simple but important security layer. Passwords are typically weak enough to be susceptible to brute force attacks, or too complex to easily remember. Even password generators and password management tools like LastPass have not been […]

Read More…

How Ronaldo’s Hair Explains Cybersecurity

Security tools abound that promise to protect you from the looming threat of hackers everywhere. Many of them look great, but their value is dubious. They might perform some specific task like packet inspection at the perimeter or bot detection, but aren’t actually doing the complex work required to inspect the millions (and in some […]

Read More…

Veeva

Lacework Helps Veeva Systems Automate Security and Compliance for its AWS Cloud

Mountain View, Calif. – May 17, 2018 –  Lacework®, the industry’s first solution to bring automation, speed and scale to cloud security, today announced that Veeva Systems has chosen the Lacework Cloud Security Platform to provide advanced security and compliance capabilities atop its infrastructure hosted in Amazon Web Services (AWS). Lacework enables Veeva, a leader […]

Read More…

Avoiding Holes in Your AWS Buckets

Originally published in InfoSec Island on April 12, 2018.  Enterprises are moving to the cloud at a breathtaking pace, and they’re taking valuable data with them. Hackers are right behind them, hot on the trail of as much data as they can steal. The cloud upends traditional notions of networks and hosts, and it topples […]

Read More…

Amazon Web Services

Lacework Announces New Capabilities Enabling AWS Customers to Rapidly Implement Security Best Practices and Proactively Identify S3 Buckets at Risk

Mountain View, Calif. – November 15, 2017 – Lacework™, the industry’s first solution to bring automation, speed and scale to cloud security, today announced new features that enable Amazon Web Services (AWS) customers to easily and continuously maintain an AWS cloud configuration that is compliant with proven security best practices. Lacework now automatically reports on […]

Read More…

File Integrity Monitoring

Lacework Adds File Integrity Monitoring to its Cloud Security Platform

Mountain View, Calif. – October 31, 2017 – Lacework™, the industry’s first solution to bring automation, speed and scale to cloud security, has added File Integrity Monitoring (FIM) to its platform, enabling FIM to be more than a compliance checkmark and making it an integral part of the threat detection process. FIM’s file integrity signals […]

Read More…

Amazon Web Services

Lacework Brings Zero-Touch Anomaly Detection to AWS Accounts

Mountain View, Calif. – August 14, 2017 – Lacework™, the industry’s first zero-touch cloud security solution, today announced that Lacework Polygraph is now integrated with Amazon Web Services (AWS) CloudTrail, extending the company’s zero-touch security approach to protect AWS accounts. Using Lacework for AWS CloudTrail, cloud teams can make sense of CloudTrail data, deepen visibility […]

Read More…

Lacework’s Partnerships and Integrations Establish Foundation of New Cloud Security Stack

Mountain View, Calif. – July 25, 2017 – Lacework™, the industry’s first zero-touch cloud security solution, today announced a range of partnerships across the security and cloud ecosystems as critical building blocks of a security stack natively adapted to cloud deployments in Amazon Web Services (AWS), Microsoft Azure and private clouds. Organizations transitioning to modern […]

Read More…

Free Trial

Lacework Announces 14–Day Free Trial of Zero-Touch Cloud Workload Protection Platform (CWPP)

Mountain View, Calif. – June 27, 2017 – Lacework™, the industry’s first zero-touch cloud workload security solution, today announced the immediate availability of a 14-day free trial for its zero-touch cloud workload protection platform.  With this free trial, global security teams can rapidly assess their security posture on Amazon Web Services (AWS), Microsoft Azure and […]

Read More…