Cloud security company Lacework is laying off a significant chunk of its workforce as a result of restructuring.
The firm blamed the layoffs on a “seismic shift” in public and private markets, which have forced it to restructure and change its plan.
“While we do not have control of the environment around us, we do have a responsibility to control how we operate our business and make changes as needed to best position the company for continued and long-term success,” the company said.
“We have adjusted our plan to increase our cash runway through to profitability and significantly strengthened our balance sheet so we can be more opportunistic around investment opportunities and weather uncertainty in the macro environment,” it added.
News of the layoffs came to light on Wednesday, hours before the company published a blog post explaining its decision. Gergely Orosz of The Pragmatic Engineer Newsletter broke the news when he tweeted that the company was laying off roughly 300 employees, or 20% of its workforce.
Lacework has confirmed for SecurityWeek that 20% of staff is being laid off, but said that the actual number reported on Twitter is “a significant overestimate.”
In a press release issued in March, the cloud security company said it had over 1,000 employees, 85% of which were hired after the start of the COVID-19 pandemic.
Lacework was slammed on social media for the way it handled the layoffs, but the company argued that it had delayed the broader notification to take the time to speak with each of the impacted people individually.
Several companies have offered jobs to those who were terminated by Lacework.
The layoffs were announced just months after the company raised $1.3 billion in a second Series D funding round and was valued at $8.3 billion.
Related: Is the ‘Great Resignation’ Impacting Cybersecurity?
Related: Gaining and Retaining Security Staff in The Age of the Great Resignation
Related: 3 Steps Security Leaders Can Take Toward Closing the Skills Gap
Related: With the ‘Great Resignation’ Comes the ‘Great Exfiltration’

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
