Video Series
Lacework Explained Video Series
Lacework Tutorials
Series Summary
This video series delves into various aspects of cloud security and management using Lacework’s advanced capabilities. The first video explores vulnerability scanning and reporting, highlighting Lacework’s ability to identify and manage risks across hosts and containers with its intuitive dashboard. Next, the series examines how infrastructure as code (IaC) integrates with Lacework, focusing on “shift left” security practices to enhance early threat detection and maintain secure coding environments. The third video addresses cloud compliance challenges, demonstrating how automation and centralised dashboards can simplify compliance management and streamline audit processes.
Following that, a video on attack path analysis reveals how understanding attacker strategies and centralising risk information can improve response efficiency. Another installment covers cloud security alerting, showcasing the shift from rule-based systems to anomaly detection with machine learning to reduce false positives. The final video provides insights into managing cloud resources with Polygraph technology, offering advanced analytics for a unified view of security statuses and potential threats. Together, these videos provide a comprehensive guide to optimising cloud security and compliance with Lacework.
Following that, a video on attack path analysis reveals how understanding attacker strategies and centralising risk information can improve response efficiency. Another installment covers cloud security alerting, showcasing the shift from rule-based systems to anomaly detection with machine learning to reduce false positives. The final video provides insights into managing cloud resources with Polygraph technology, offering advanced analytics for a unified view of security statuses and potential threats. Together, these videos provide a comprehensive guide to optimising cloud security and compliance with Lacework.