Head of Product Marketing
Sweet Security was recognized as a Cloud Security Leader Leader and a Cloud Application Detection & Response (CADR) Leader.
Sarah Elkaim
|
2
min read
Bridging Runtime Visibility and Secrets Management in Kubernetes with Sweet Security and CyberArk
3
Let’s be honest; reporting isn't the most glamorous part of the job as CISOs.
Not every vulnerability deserves your attention—and CVSS alone won’t tell you which ones actually matter.
At Sweet Security, we believe that vulnerability management needs to shift. That’s why we’re introducing a new approach powered by runtime.
4
Sweet Security and Jit are partnering to bring application security teams the best way to prioritize CVEs.
Sweet Security’s LLM-powered storytelling capability is setting a new standard by reducing investigation times by up to 90%.
Harness the Power of Sweet and Torq: Real Time Detection and Response Meets Seamless Automation
Sweet Security’s new Package Reputation feature enables zero-day detection for open-source software.
Sweet Security’s new Issues Hub takes the guesswork out of prioritization, helping cloud security teams focus on the most critical problems.
Sweet Security’s runtime-powered CSPM is an excellent starting point for those looking to kickstart their cloud security journey.
One of Sweet's most powerful features is tracking manual actions and identifying the human identity behind suspicious activity in cloud.
1
The benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application
5
As reported, Snowflake, the data cloud company, is currently under fire for an account hacks campaign...
Qualys research has discovered a critical Remote Code Execution (RCE) vulnerability, CVE-2024-6387, that has resurfaced in OpenSSH.
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
You Moved Windows Workloads to the Cloud. What’s Next?Sure, your cloud provider secures the infrastructure, but what about the workloads...
Managing non-human identities (NHIs) has become a paramount challenge for security teams. These identities, ranging from automated scripts..
Sweet Security is proud to announce its comprehensive Cloud Native Detection and Response platform is now available on the AWS...
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...