Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](3.227.251.94|AS14618) to the bottom mailbox to add to the whitelist
文章列表
2023-01-19 22:54 The Polygraph journey #lacework #威胁情报 In 1987, one of the world’s most popular puzzle book characters made his literary debut in England. Dressed in a red and white striped shirt and hat, the bespectacled Wally would appear, or more accurately disappear, into large crowds of people. The goal was to find the elusive Wally, who was
2023-01-10 22:00 50 CISOs to watch #lacework #威胁情报 The role of CISO is one of the most important in any organization, and one that holds some of the most significant responsibilities: keeping people and sensitive data safe and secure. Security has been a board-level conversation for a while now –– a direct result of the importance it plays for busin
2023-01-10 22:00 50 CISOs to watch #lacework #威胁情报 The role of CISO is one of the most important in any organization, and one that holds some of the most significant responsibilities: keeping people and sensitive data safe and secure. Security has been a board-level conversation for a while now –– a direct result of the importance it plays for busin
2023-01-06 23:47 Go farther with Fargate: secure your containers with Lacework #lacework #威胁情报 Containers and the security required to protect them have become among the most important aspects of modern software development. With the launch of Docker and Kubernetes, and the subsequent popularity of these development platforms, containers are changing how enterprises build, deliver, and improv
2023-01-06 22:00 Go farther with Fargate: secure your containers with Lacework #lacework #威胁情报 Containers and the security required to protect them have become among the most important aspects of modern software development. With the launch of Docker and Kubernetes, and the subsequent popularity of these development platforms, containers are changing how enterprises build, deliver, and improv
2022-12-21 22:00 ‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why #lacework #威胁情报 Hackers and cybercriminals aren’t the same. Pop culture and media have popularized using the terms interchangeably, which has led to many people—myself included—accidentally using the wrong word. While it seems like a minor mistake, grouping the good hackers with the bad ones is more harmful than yo
2022-12-21 22:00 ‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why #lacework #威胁情报 Hackers and cybercriminals aren’t the same. Pop culture and media have popularized using the terms interchangeably, which has led to many people—myself included—accidentally using the wrong word. While it seems like a minor mistake, grouping the good hackers with the bad ones is more harmful than yo
2022-12-19 22:00 Lacework named a Leader in G2 Winter Reports #lacework #威胁情报 G2 has once again named Lacework as a G2 Leader in five categories and awarded 16 badges in the G2 Winter Reports. We are grateful to our customers for sharing their reviews showcasing their experience with the Lacework® Polygraph® Data Platform. It’s a great way to launch the New Year. Helpin
2022-12-16 22:00 CISO Series: Why cloud security is a different beast than on-premise #lacework #威胁情报 As virtually every organization moves to and builds in the cloud, they’re realizing securing those cloud environments is both critical and, in many ways, more complex than on-premises. Why? Simply put, when anyone can create new accounts and services, security teams have no choice but to move quickl
2022-12-14 22:00 It’s time to scale up your cloud security posture #lacework #威胁情报 Organizations need better visibility into their cloud security posture so they can better understand and manage their risk and achieve compliance. But operationalizing posture at scale can be daunting and resource intensive. This is why Lacework has been focused on continually delivering the deepest
2022-12-13 22:00 Know your enemy:A look at 4 common attack paths #lacework #威胁情报 We know cloud environments are incredibly complex. We also know attackers are always seeking paths of least resistance to compromise a system. Which means cybersecurity is a race against time and the speed to respond is measured in dollars and cents. Every minute counts when competing with attackers
2022-12-12 22:00 Manage Lacework with AWS CloudFormation and CDK #lacework #威胁情报 The Lacework Polygraph® Data Platform provides our customers with a variety of ways to manage your cloud security. From our command-line interface (CLI), to language software development kits (SDKs), to infrastructure-as-code (IaC), security engineers and site reliability engineers (SREs) have numer
2022-12-07 22:00 What is CSPM? #lacework #威胁情报 The driving force behind cloud adoption has shifted over the years. Initially, companies flocked to the cloud for its cheap, abundant compute and storage. Now however, the cloud has become the default operating system that organizations rely on to run their businesses and develop new products and se
2022-12-07 22:00 What is CSPM? #lacework #威胁情报 The driving force behind cloud adoption has shifted over the years. Initially, companies flocked to the cloud for its cheap, abundant compute and storage. Now however, the cloud has become the default operating system that organizations rely on to run their businesses and develop new products and se
2022-12-06 22:00 AndroxGh0st – the python malware exploiting your AWS keys #lacework #威胁情报 Hackers may hijack AWS infrastructure for a number of reasons. However, the most common motives are to facilitate illicit cryptomining or spamming. While cryptomining is more profitable on infrastructure owned by somebody else, the same can also be said for SMTP abuse and spam. Over the past year, n