At Sweet Security, we believe that vulnerability management needs to shift. That’s why we’re introducing a new approach powered by runtime.
Sarah Elkaim
|
4
min read
Sweet Security and Jit are partnering to bring application security teams the best way to prioritize CVEs.
Sarah Elkaim
|
2
min read
Sweet Security’s LLM-powered storytelling capability is setting a new standard by reducing investigation times by up to 90%.
Sarah Elkaim
|
3
min read
Harness the Power of Sweet and Torq: Real Time Detection and Response Meets Seamless Automation
Sarah Elkaim
|
4
min read
Sweet Security’s new Package Reputation feature enables zero-day detection for open-source software.
Sarah Elkaim
|
3
min read
Sarah Elkaim
|
2
min read
Sweet Security’s new Issues Hub takes the guesswork out of prioritization, helping cloud security teams focus on the most critical problems.
Sarah Elkaim
|
4
min read
Sweet Security’s runtime-powered CSPM is an excellent starting point for those looking to kickstart their cloud security journey.
Sarah Elkaim
|
4
min read
One of Sweet's most powerful features is tracking manual actions and identifying the human identity behind suspicious activity in cloud.
Sarah Elkaim
|
1
min read
The benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application
Sarah Elkaim
|
5
min read
As reported, Snowflake, the data cloud company, is currently under fire for an account hacks campaign...
Sarah Elkaim
|
5
min read
Qualys research has discovered a critical Remote Code Execution (RCE) vulnerability, CVE-2024-6387, that has resurfaced in OpenSSH.
Sarah Elkaim
|
2
min read
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
Sarah Elkaim
|
min read
Sarah Elkaim
|
min read
Sarah Elkaim
|
min read
You Moved Windows Workloads to the Cloud. What’s Next?Sure, your cloud provider secures the infrastructure, but what about the workloads...
Sarah Elkaim
|
min read
Managing non-human identities (NHIs) has become a paramount challenge for security teams. These identities, ranging from automated scripts..
Sarah Elkaim
|
4
min read
Sweet Security is proud to announce its comprehensive Cloud Native Detection and Response platform is now available on the AWS...
Sarah Elkaim
|
2
min read
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...
Sarah Elkaim
|
5
min read