Infosec products of the month: November 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, …
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, …
Here’s a look at the most interesting products from the past week, featuring releases from Acronis, Flashpoint, ImmuniWeb, Lacework, Picus Security, and Vanta. Flashpoint’s …
Lacework announced new cloud-native application protection platform (CNAPP) capabilities for the Polygraph Data Platform that provide improved attack path analysis and …
eSentire partners with Lacework, advancing its protection of cloud workloads, containers, applications, and Kubernetes with 24/7 Multi-Signal MDR and Cloud Security Posture …
Lacework has revealed a new integration with Google Cloud‘s Chronicle Security Operations, bringing its cloud-native application protection platform (CNAPP) capabilities …
In this Help Net Security video, Mark Nunnikhoven, Distinguished Cloud Strategist at Lacework, discusses agent-based vs. agentless approaches in security. Ransomware is …
Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Bayside …
In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …
At Black Hat USA 2022, Lacework announced new capabilities that enable organizations to uncover more critical threats to their infrastructure and empower teams to collaborate …
At RSA Conference 2022, Lacework announced the Polygraph Data Platform has been enhanced with new capabilities to monitor and secure more runtime environments and workloads, …
Lacework announced new features added to the Polygraph Data Platform which provide enhanced visibility and protection in Kubernetes environments. Through Kubernetes audit log …
In the world of cybersecurity, combating threats is like playing endless, hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging, often from unexpected …