One of Sweet's most powerful features is tracking manual actions and identifying the human identity behind suspicious activity in cloud.
Sarah Elkaim
|
1
min read
The benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application
Sarah Elkaim
|
5
min read
As reported, Snowflake, the data cloud company, is currently under fire for an account hacks campaign...
Sarah Elkaim
|
5
min read
Qualys research has discovered a critical Remote Code Execution (RCE) vulnerability, CVE-2024-6387, that has resurfaced in OpenSSH.
Sarah Elkaim
|
2
min read
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
Sarah Elkaim
|
min read
Sarah Elkaim
|
min read
Sarah Elkaim
|
min read
You Moved Windows Workloads to the Cloud. What’s Next?Sure, your cloud provider secures the infrastructure, but what about the workloads...
Sarah Elkaim
|
min read
Managing non-human identities (NHIs) has become a paramount challenge for security teams. These identities, ranging from automated scripts..
Sarah Elkaim
|
4
min read
Sweet Security is proud to announce its comprehensive Cloud Native Detection and Response platform is now available on the AWS...
Sarah Elkaim
|
2
min read
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...
Sarah Elkaim
|
5
min read