LaceworkinLacework: Cloud & Container Security InsightsWhy You Need to EnhanceNative AWS Security ToolingIn cloud environments with ephemeral servers and containers, single-layer security isn’t security at all. Cyber-threats target…Jul 2, 2019Jul 2, 2019
LaceworkinLacework: Cloud & Container Security InsightsAn Unauthenticated RCE Gold Rush: A Look at Attacks Exploiting Confluence CVE-2019–3396The recent Confluence vulnerability (CVE-2019–3396) created a gold rush for threat actors. Attackers are exploiting it for cryptojacking…May 21, 2019May 21, 2019
LaceworkinLacework: Cloud & Container Security InsightsCompliance + Security: It’s What’s For DinnerIn the cloud, compliance and security are highly reliant upon one another, and they share a common goal: responsibility for keeping an…May 16, 2019May 16, 2019
LaceworkinLacework: Cloud & Container Security InsightsSilent But Deadly: Cryptomining and Cloud SecurityThe crypto currency frenzy at the end of 2017 is well behind us, and the bubble has burst, but that doesn’t mean that you shouldn’t be…May 1, 2019May 1, 2019
LaceworkinLacework: Cloud & Container Security InsightsWhy Are Data Leaks Making Headlines Daily?Just as you would protect your physical assets by locking the doors to your shop, the data that is stored and transacted in your cloud…May 1, 2019May 1, 2019
LaceworkSilent But Deadly: Cryptomining and CloudThe crypto currency frenzy at the end of 2017 is well behind us, and the bubble has burst, but that doesn’t mean that you shouldn’t be…Apr 25, 2019Apr 25, 2019
LaceworkCryptojacking Campaign Targets Exposed Kubernetes ClustersReports on in-the-wild attacks on Kubernetes clusters are somewhat sparse. This coupled with multiple attack vectors prompted us to deploy…Apr 16, 2019Apr 16, 2019
LaceworkThe Importance of Process-to-Process VisibilityOne of the challenges in securing processes operating in cloud environments is the visibility limitations imposed either by the cloud…Apr 12, 2019Apr 12, 2019
LaceworkAnomaly Detection vs. Rules: Better Security Insights, Designed for the Modern EnterpriseTraditionally with monitoring tools — whether security, application, or infrastructure — it’s necessary to invest considerable time…Apr 11, 2019Apr 11, 2019
LaceworkFile Integrity Monitoring (FIM): Using a SaaS Solution for SaaS EnvironmentsWhile all security vendors talk about things like security posture and identification of threats, we advocate a methodology that is…Apr 11, 2019Apr 11, 2019