At Sweet Security, we believe that vulnerability management needs to shift. That’s why we’re introducing a new approach powered by runtime.
Sarah Elkaim
|
4
min read
Sweet provides a comprehensive and structured view of all API activity, helping security and engineering teams quickly identify risks.
Hilit Yurman
|
4
min read
Sweet Security and Jit are partnering to bring application security teams the best way to prioritize CVEs.
Sarah Elkaim
|
2
min read
Sweet Security’s LLM-powered storytelling capability is setting a new standard by reducing investigation times by up to 90%.
Sarah Elkaim
|
3
min read
Sweet Security Introduces LLM-Powered Cloud Detection Engine to Reduce False Positives & Detect Unknown Unknowns
Or Harel
|
3
min read
Sweet Security’s new Package Reputation feature enables zero-day detection for open-source software.
Sarah Elkaim
|
3
min read
Sarah Elkaim
|
2
min read
Sweet Security’s new Issues Hub takes the guesswork out of prioritization, helping cloud security teams focus on the most critical problems.
Sarah Elkaim
|
4
min read
Sweet Security’s runtime-powered CSPM is an excellent starting point for those looking to kickstart their cloud security journey.
Sarah Elkaim
|
4
min read
Cloud security is no longer an afterthought; it’s a frontline defense.
Dror Kashti
|
2
min read
Sweet Security is thrilled to announce comprehensive support for on-premises environments.
Lea Edelstein
|
4
min read
Sweet is excited to announce our new custom rules detection capability for CDR and ADR, which allows users to build customized rules...
Or Harel
|
5
min read
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
Sarah Elkaim
|
min read
As cloud environments grow in complexity, having a clear view of the intricate relationships between cloud assets across your infrastructure
Lea Edelstein
|
min read
Sweet Security has added a CIS Compliance feature to its Cloud Native Detection and Response Platform.
Lea Edelstein
|
min read
Managing secrets and identities is crucial to maintaining a secure environment as attackers are leveraging credentials to exploit cloud...
Lea Edelstein
|
6
min read
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...
Sarah Elkaim
|
5
min read