Keeping up with the Cloud: Sarah Elkaim's new blog tackles why traditional methods can't keep up with evolving cloud threats. Learn how #runtime protection can fill these gaps and strengthen defenses. Read more: https://hubs.li/Q02Jhnsk0 #CloudSecurity #RuntimeSecurity #SweetSecurity
About us
Sweet’s Cloud Runtime Security Suite delivers first-to-market capabilities for defending cloud workloads, shifting cloud security right. Founded by retired, elite IDF commanders with prodigious expertise in offensive and defensive cloud security, Sweet’s approach elevates the ability of security teams to shut down cloud attacks when they occur, where they occur, with maximum precision and minimal business disruption. Say hello here, or at: http://sweet.security
- Website
-
https://sweet.security
External link for Sweet Security
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Type
- Privately Held
- Specialties
- Cloud Security, Runtime Security, Threat Detection and Response, and Workloads
Employees at Sweet Security
Updates
-
Sweet Security reposted this
🎩 #BlackHat2024 Countdown! 🎩Today's Spotlight: Sweet Security Sweet addresses the blind spots in cloud applications with a cutting-edge cloud runtime security platform that detects and mitigates threats in real time. By leveraging runtime insights, Sweet effectively handles malicious attacks and active vulnerabilities, taking cloud security to the next level. Meet the Sweet team at booth 3113 to discuss how they can enhance your company's protection. Dror Kashti, Eyal Fisher, Noa Glumcher, Eve Ovadia, Lea Edelstein Olkinizki and Adam Shor are excited to connect with you. Visit them at booth 3113 or click the below link to setup a meeting⬇️⬇️⬇️ https://lnkd.in/dky-6CK4 Kobi Samboursky, Arik Kleinstein, Lior Litwak, Elizabeth Atash #BlackHat #Cybersecurity #SweetSecurity #GlilotCapital
-
-
Ensuring robust security across applications, workloads, and the cloud is paramount. James Berthoty's comprehensive article sheds light on the necessity of unifying these elements into a cohesive #runtime solution. Explore his detailed analysis and discover why integrated security measures ensure no threat goes undetected. Also, visit Sweet at #BlackHat24 booth #3113 to see what we offer in this space. https://hubs.li/Q02J4PkR0
-
-
Sweet is proud to be featured in IT-Harvest's Top Performers to look for at Black Hat , and be the first Israeli company on this years' list! Visit us at booth #3113 to learn more. Below is a quick excerpt from the app: “The company's flagship offering, the Cloud Runtime Security Suite, is designed to provide robust defenses across all stages of a cyber attack, focusing on the operational or "runtime" phase of cloud-hosted applications and services. This suite is equipped with a runtime sensor that can be deployed in under five minutes, offering immediate cloud-native cluster visibility and protection against both known vulnerabilities and evolving threats in real-time." Thanks for having us! Richard Stiennon
-
🌟 Exciting news! Our Chief Product Officer, Eyal Fisher, shares his insights on preventing Non-Human Identity attacks in cloud environments in his latest article for SC Media. 📝 Ready to bolster your cloud security against emerging #NHI threats? Read the full article. #CloudSecurity #CloudRuntime
Three ways to thwart non-human identity attacks
scmagazine.com
-
The recent outage should be a lesson for software makers to ensure that testing procedures evolve with the increasing use of the cloud and a highly diversified desktop and server environment. Read Sweet's CEO, Dror Kashti's note on DevOps.com. #Crowdstrike #BSOD #CloudSecurity
CrowdStrike Software Update Sparks Microsoft Outage, Global Chaos - DevOps.com
https://devops.com
-
⚠️Sweet's statement re the recent unfortunate and widespread BSOD caused by an update to CrowdStrike’s agent: The cloud has become a mission-critical part of everyday life, powering everything from banks to hospitals and airlines. The recent blue screen of death (BSOD) issues caused by CrowdStrike's faulty sensor update serve as a stark reminder of the high stakes involved. Production bugs can literally put lives at risk. The outages underscore the importance of updating security processes and technologies to adapt to a cloud-driven world. Bugs that quickly propagate worldwide can bring down essential services, which is why it is crucial to rely on: 📦 Sandboxing - to contain bugs 🦀 Safe-by-design languages - like Rust 🐝Non-destructive technologies - like eBPF. At Sweet Security, we are committed to providing solutions designed for the cloud. Our platform utilizes eBPF (Extended Berkeley Packet Filter) deployment, ensuring our solution will not compromise the kernel. Unlike kernel drivers, where any bug can lead to corruption and crashes, eBPF code is validated before loading and runs in a sandbox, containing bugs and mitigating risks. 📱We are here to support our customers, and anyone, during this challenging time and offer any assistance required. Our goal is to ensure the integrity and security of your systems remain intact, especially during incidents like this. ☁️Ultimately, the cloud requires solutions born for the cloud. Hopefully, this incident serves as a teachable moment that the price of staying static outweighs the price of adapting to new technologies. 🍭At Sweet Security, we will continue to prioritize your security and business continuity, working tirelessly to ensure your cloud environments remain safe and resilient. Thank you for your trust in Sweet Security. #CloudSecurity #eBPF #Cybersecurity #SweetSecurity #CrowdStrike #CloudRuntimeSecurity #BusinessContinuity #BSOD
-
-
🔒 Ready or not, here we come! 🕵️♂️ Sweet Security is cracking open the black box of cloud security at #BlackHat2024. Visit us at Booth 3113 to uncover hidden threats and secure your cloud. Don’t miss out on turning the unknown into your competitive edge! #CloudSecurity #CyberSecurity #BlackHat #SweetSecurity #CloudRuntimeSecurity
-
-
Keep non-human identities in check! In her latest blog post, Sarah Elkaim explores strategies to prevent #NHI attacks and keep your cloud applications secure. 🔐🤖 #CloudSecurity #Runtime #ApplicationSecurity Check out the blog!
Practical Ways to Thwart Non-Human Identity Attacks - Sweet
sweet.security
-
Sweet Security reposted this
Every employer knows that a good employee can mean different things. It could be someone who is super dedicated, giving their all to make things work. It could be a creative genius whose ideas are like gold. It could be that one colleague who brightens everyone's day just by being there. But it's rare to find someone who embodies all these qualities. Remember when I told you to stay tuned for the next post about Omer Rivlin? Well, the wait is over, and I promise it’s worth it. Omer Rivlin is a musical prodigy, playing the piano, guitar, and ukulele with flair. His singing voice is incredible too, especially when he and Gali Burin have their impromptu jam sessions. When a great tune starts playing in the office, Omer's excitement is so contagious that you can't help but feel the vibe too. But wait, there's more! Omer is also a creative powerhouse. He comes up with innovative solutions that no one else would think of. His intelligence and creativity are truly off the charts. Beyond his professional talents, Omer is a fantastic friend and colleague. He always notices the little things about his teammates. Honestly, one of my favorite moments is waiting in line for coffee behind him, knowing it will be an interesting and funny few minutes. And did I mention he's a remarkable athlete? Omer practices yoga and movement, and when it comes to dancing, he owns the dance floor. Seriously, you have to see his moves. So, do I need to say more to explain how lucky we are to have Omer with us? Sweet Security #SweetEmployees
-