Cloud security is no longer an afterthought; it’s a frontline defense.
Dror Kashti
|
2
min read
Sweet is excited to expand its support into serverless environments, launching a new sensor for AWS Lambda, adding critical runtime...
Lea Edelstein
4
Sweet Security is proud to announce its comprehensive Cloud Native Detection and Response platform is now available on the AWS...
Sarah Elkaim
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...
5
Yesterday, a new set of vulnerabilities (CVE-2024-47076, CVE-2024-47175/6/7) was discovered on Linux’s Common UNIX Printing System...
Tomer Filiba
3
Managing secrets and identities is crucial to maintaining a secure environment as attackers are leveraging credentials to exploit cloud...
6
In recent months, Sweet has expanded its features within the realm of Cloud Vulnerability Management to include the following...
Or Harel
Sweet is thrilled to announce a new feature: AI Response Playbooks. This groundbreaking capability is now available on the Sweet Security...
We’re excited to announce that Sweet Security has officially released CandyStore – an extremely fast open source key-value store
Sweet Security has added a CIS Compliance feature to its Cloud Native Detection and Response Platform.
As cloud environments grow in complexity, having a clear view of the intricate relationships between cloud assets across your infrastructure
The benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
Managing non-human identities (NHIs) has become a paramount challenge for security teams. These identities, ranging from automated scripts..
Bleeping Computer has recently reported on a new vulnerability within Ghostscipt, a widely used library for handling PostScript and PDF file
Sweet is excited to announce our new custom rules detection capability for CDR and ADR, which allows users to build customized rules...
Qualys research has discovered a critical Remote Code Execution (RCE) vulnerability, CVE-2024-6387, that has resurfaced in OpenSSH.
Sweet Security is thrilled to announce comprehensive support for on-premises environments.
As reported, Snowflake, the data cloud company, is currently under fire for an account hacks campaign...
Runtime security refers to the measures and practices employed to protect an application and workload while it is executing or running.
Sweet team
10
The recent XZ (liblzma) supply-chain attack is a marvel of social engineering and a great example of evading detection under the many-eyes..
I spent more than 25 years in the Israel’s Defense Forces (IDF), moving up the ranks of Unit 8200 to lead a Cyber Department...
One complaint I often hear from stakeholders across the cloud security ecosystem is that there are way too many overlapping acronyms...
Just like New Year’s resolutions, predictions are a rite of passage, an opportunity for us to take stock of our hopes and concerns for...
Eyal Fisher
A common misconception about moving to the cloud is that it’s a “lift and shift” type effort, when really, it’s more like lift, ADAPT, and..
Stay updated