• Cloud Security

      Code Security

      CNAPP SecuritySecure the multicloud from risk to threatsWorkload ProtectionSecure threats at runtimeIdentities and EntitlementsReduce CIEM riskPosture ManagementPrioritize risks with CSPM
      Kubernetes SecuritySecure your K8s clustersData Posture ManagementSmarter protection with DSPM

      Code Security

      Code Security

      Code Security OverviewSecure first and third-party codeInfrastructure as CodeFix misconfigurations soonerSoftware Composition AnalysisFix vulnerabilities and SBOMsApplication Security TestingSecure code as you write it

      Edge Security

      Edge Security

      Edge Security OverviewUse data to secure the edgeEdge Secure Internet AccessSecure your web accessEdge Secure Private AccessAccess apps using zero trustEdge Data SecurityProtect your SaaS data
      Platform OverviewManage risks to threats in a single, unified platform
    • By Role

      Security OperationsPinpoint cloud issues, with rich context to act fastDeveloperBuild faster with continuous security and deep visibility

      By Size

      For EnterprisesGain automated code-to-cloud security at scaleFor StartupsAutomate processes to accelerate small business growth
      product gif

      See Lacework in action

      Experience the Lacework advantage in cloud security

      Learn More

    • Customers

      Customer StoriesSupportCommunityDocumentation
      product gif

      Clari

      Find out how major companies worldwide use Lacework to secure their cloud.

      Learn More

    • Resources

      Resource CenterEventsBlogCode to Cloud Podcast
      product gif

      See Lacework in action

      Experience the Lacework advantage in cloud security

      Learn More

    • Company

      About UsCareersPartnersPress
    • Login
    • Contact Us
    • Login
Blog

Blog Posts

  • All
  • Cloud Security
  • DevSecOps
  • Edge Security
  • Lacer Life
  • Product Updates
  • Research

July 26, 2024

SAST for the People

Read Blog

July 2, 2024

Critical RCE vulnerability on OpenSSH: Detecting and mitigating CVE-2024-6387 “regreSSHion"

Read Blog

June 17, 2024

How Lacework caught an accidental insider threat

Read Blog

June 13, 2024

Introducing the third edition of the CISO Board Book

Read Blog

June 11, 2024

The three things we are so excited about at AWS re:Inforce 2024

Read Blog

June 10, 2024

A new era of security in the cloud

Read Blog

June 6, 2024

Detecting AI resource-hijacking with Composite Alerts

Read Blog

June 4, 2024

Why CTEM is the efficiency boost your security team needs: A Q&A with Andy Schneider and Spencer Engleson

Read Blog

May 31, 2024

Why supply chain security is still a real concern: A Q&A with Global Field CISO Tim Chase

Read Blog

1of42

Contact Us

Explore

PlatformSolutionsThreat DetectionVulnerability ManagementContainer SecurityMulticloudCloud Security Posture and CompliancePricingSecurity Job Board

Company

About UsLeadershipCareersInvestorsPartnersAwardsPress ReleasesMedia LibraryMedia CoverageLegalTrust

Learn

BlogResourcesLacework AcademyLacework CommunityDocumentationCloud Security Fundamentals

Support

SupportStatusLogin

© 2025, Lacework,  All Rights Reserved.

  • Privacy Policy
  • |
  • Terms of Use