Sweet Security extended its runtime coverage to Windows environments.
Tomer Filiba
|
4
min read
Meet SweetX: an AI agent built directly into the heart of your cloud.
Hilit Yurman
3
Introducing Data Security at Sweet — a centralized place for all sensitive data detections across your organization.
Sweet extends its security coverage further left in the development process, directly into CI builds, so risks are caught before production.
Noam Raveh
SecOps can now instantly see which developer last updated an image where a vulnerability was found.
2
Sarah Elkaim
As CISOs, we tend to measure security effectiveness by one thing: whether or not a breach occurred.
Not every vulnerability deserves your attention—and CVSS alone won’t tell you which ones actually matter.
At Sweet Security, we believe that vulnerability management needs to shift. That’s why we’re introducing a new approach powered by runtime.
Sweet provides a comprehensive and structured view of all API activity, helping security and engineering teams quickly identify risks.
Sweet Security and Jit are partnering to bring application security teams the best way to prioritize CVEs.
Sweet Security’s LLM-powered storytelling capability is setting a new standard by reducing investigation times by up to 90%.
Sweet Security Introduces LLM-Powered Cloud Detection Engine to Reduce False Positives & Detect Unknown Unknowns
Or Harel
Sweet Security’s new Package Reputation feature enables zero-day detection for open-source software.
Sweet Security’s new Issues Hub takes the guesswork out of prioritization, helping cloud security teams focus on the most critical problems.
Sweet Security’s runtime-powered CSPM is an excellent starting point for those looking to kickstart their cloud security journey.
Cloud security is no longer an afterthought; it’s a frontline defense.
Dror Kashti
Sweet Security is thrilled to announce comprehensive support for on-premises environments.
Lea Edelstein
Sweet is excited to announce our new custom rules detection capability for CDR and ADR, which allows users to build customized rules...
5
We are excited to introduce the latest addition to Sweet's security platform: the Runtime SBOM (Software Bill of Materials).
As cloud environments grow in complexity, having a clear view of the intricate relationships between cloud assets across your infrastructure
Sweet Security has added a CIS Compliance feature to its Cloud Native Detection and Response Platform.
Managing secrets and identities is crucial to maintaining a secure environment as attackers are leveraging credentials to exploit cloud...
6
A Server-Side Request Forgery (SSRF) attack occurs when an attacker tricks a server into making requests to other internal or external...