In this blog, we’ll explore an attack recently seen in a customer’s environment involving cross-account role assumptions.
Lea Edelstein
|
5
min read
A common misconception about moving to the cloud is that it’s a “lift and shift” type effort, when really, it’s more like lift, ADAPT, and..
Dror Kashti
|
2
min read
Just like New Year’s resolutions, predictions are a rite of passage, an opportunity for us to take stock of our hopes and concerns for...
Eyal Fisher
|
2
min read
One complaint I often hear from stakeholders across the cloud security ecosystem is that there are way too many overlapping acronyms...
Dror Kashti
|
2
min read
The benefits of rich cloud environments are widely known, but their complexity has blurred the lines between infrastructure and application
Sarah Elkaim
|
5
min read
Yesterday, a new set of vulnerabilities (CVE-2024-47076, CVE-2024-47175/6/7) was discovered on Linux’s Common UNIX Printing System...
Tomer Filiba
|
3
min read
Sweet team
|
min read
Sweet is excited to expand its support into serverless environments, launching a new sensor for AWS Lambda, adding critical runtime...
Lea Edelstein
|
4
min read