Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report

Posted on October 14, 2025October 14, 2025 By CWS

Tel Aviv, Israel, October 14th, 2025, CyberNewsWire

Candy Safety, a pacesetter in Runtime Cloud and AI safety options, at present introduced that it has been acknowledged as each a Cloud Safety Chief and a Cloud Software Detection & Response (CADR) Chief within the 2025 Cloud Safety Report by James Berthoty of ‘Latio Tech.’

The 2025 Cloud Safety Report provides insights into the evolution of cloud safety, tracing the shift from posture-focused instruments to real-time, risk-driven platforms powered by runtime insights.

Recognizing that cloud safety decisions rely closely on every group’s structure, staff dimension, and safety targets, Latio additionally acknowledges that safety operations groups needs to be empowered with software layer insights to their working purposes.

The report offers clear, actionable suggestions, structured by means of a call tree to assist groups design the appropriate cloud safety stack for his or her particular wants.

The report highlights distributors shaping the way forward for cloud safety by means of innovation, visibility, and runtime-powered protection.

Candy earned two management badges for its distinctive strategy to discovering actionable findings within the cloud and for pioneering the usage of AI to remodel early warning alerts into full assault tales.

In keeping with Latio’s evaluation, Candy Safety is constructed to find actionable findings in cloud environments. Constructed for cloud and safety operations groups, Candy offers runtime protection throughout purposes, workloads, and cloud infrastructure.

By correlating misconfigurations, id dangers, vulnerabilities, and behavioral alerts throughout the total cloud stack, Candy empowers groups to prioritize actual threats, not simply surface-level alerts. 

“Candy was a transparent selection as a cloud safety and CADR chief as innovators bringing the ability of runtime safety to practitioners,” mentioned James Berthoty, founder and CEO of Latio Tech. 

Considered one of Candy’s most acknowledged strengths is its AI capabilities that present prioritization logic and leverage a novel detection strategy that identifies suspicious habits throughout the cloud stack.

This allows Candy to show early warning alerts into full assault tales, tracing attacker exercise throughout the cloud.

By combining these alerts right into a single assault narrative throughout completely different layers of the atmosphere, Candy offers operations groups actionable perception to guard their complete cloud.

Candy’s key differentiators acknowledged within the report embody:

Runtime Safety: Candy combines runtime perception throughout vulnerabilities, threats, posture, and id and extends all of it the best way again to builders at construct time.

AI-Powered Investigation: SweetX, the corporate’s agentic investigator, leverages Candy’s proprietary LLMs to deduce the foundation reason behind an incident and allow fast response.

Strong Detections: Detect assaults as quickly as they occur in cloud environments, irrespective of the place they begin.

Investigation and Response: Candy reduces investigation time to as little as 2–5 minutes by giving analysts full, story-like context that features the total assault impression, visible graph and timeline, attaining a 205-minute imply time to decision (MTTR).

Consolidating Dangers and Threats: Mix high-severity posture alerts with real-time assault alerts to realize a unified view of your cloud standing and what to handle first.

Latio’s report additionally highlights Candy’s growth into AI SOC workflows and API-layer menace detection, which give groups visibility into their real-time assault floor and information flows throughout your entire cloud atmosphere.

“We’re proud to be acknowledged as each a Cloud Safety and CADR Chief by Latio Tech,” mentioned Dror Kashti, CEO and co-founder of Candy Safety.

“From the beginning, our purpose has been to transcend alerts and provides safety groups real-time perception into what’s truly occurring of their environments. This recognition exhibits that the {industry} is transferring towards the identical imaginative and prescient, the place readability and runtime understanding drive higher cloud protection.”

About Candy Safety 

Candy Safety is the main supplier of Runtime CNAPP options.

Powered by complete runtime insights and behavioral analytics, Candy’s unified platform correlates information throughout purposes, workloads, and cloud infrastructure to ship real-time detection and response, vulnerability administration, posture administration, id menace safety, and API Safety.

Its patent-pending LLM-powered detection engine reduces cloud detection noise to 0.04%, serving to organizations obtain industry-leading MTTR benchmarks.

Privately funded, Candy is backed by Evolution Fairness Companions, Munich Re Ventures, Glilot Capital Companions, CyberArk Ventures, and an elite group of angel traders.

For extra data, customers can go to candy.safety.

Contact

Chloe Amante

Montner Tech PR

[email protected]

Cyber Security News Tags:CADR, Cloud, Latio, Leader, Named, Report, Security, Sweet

Post navigation

Previous Post: Thousands of North Korean IT Workers Using VPNs and ‘Laptop Farms’ to Bypass Origin Verification
Next Post: Cybereason Acquired by MSSP Giant LevelBlue

Related Posts

Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Cyber Security News
Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News
Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System Cyber Security News
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
  • Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication
  • New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages
  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
  • Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News