Mitiga Appoints Charlie Thomas as CEO READ THE RELEASE

Mitiga Announces $30M Series B Led by SYN Ventures READ THE NEWS

We’re proud to report that at the open of today’s RSAC24, Mitiga was awarded the Publisher's Choice, Cloud Threat Detection Investigation & Response (TDIR) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. This news closely follows Mitiga being named a 2024 RSA Innovation Sandbox finalist.  

“We are incredibly honored to receive the Publisher's Choice for Cloud Threat Detection, Investigation & Response at the 12th Annual Global InfoSec Awards,” stated Tal Mozes, CEO and co-founder of Mitiga. “This prestigious award from Cyber Defense Magazine validates our mission to redefine how enterprises can achieve better control over their cloud environment's security and resilience. By equipping SOC teams with the most advanced tools for visibility, detection, investigation, and response, Mitiga is setting a new standard in cloud security, ensuring rapid and effective threat management for enterprises worldwide.”

It’s been an exciting journey to reach this point, because while Mitiga’s start was in cloud incident response (IR), it quickly became apparent that SecOps teams not only needed tooling for cloud IR capabilities, but also to enable detection in their complex cloud ecosystems. We distilled our expertise into a platform that empowers SecOps professionals with rich, fast context to detect cloud threats, cutting down the alert noise and replacing it with the insights that help analysts spend their limited time wisely on the most critical threats.

We also created our Investigation Workbench to help those same teams to automatically construct detailed timelines across their cloud footprints—whether they have cloud and IR expertise, or not. It’s advancements like these that help us supercharge investigation for the cloud era. Our leading-edge solutions empower enterprises to act against cloud threats, decreasing the time it takes to detect, investigate, and respond, end-to–end, from 200 days to minutes.

“Mitiga stands out for embodying the key qualities we judges seek in award winners: a proactive stance in understanding and addressing tomorrow’s threats today, delivering cost-effective solutions that fit our current economic climate, and driving innovation in unexpected ways. I believe Mitiga’s approach not only mitigates cyber risks but also strategically positions organizations to anticipate and counteract the next breach. Their commitment to these principles is what sets them apart in the cybersecurity landscape,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

To learn more about our detection, investigation, and response capabilities and where they fit into today’s tech stack, check out this recent report from ESG, or reach out to our team for a demonstration.

LAST UPDATED:

September 24, 2024

Don't miss these stories:

Make Cloud Attacks Yesterday’s Problem with Mitiga at RSA Conference 2025

Visit Mitiga at booth number N-4618 at RSA Conference 2025 to learn about cloud detection and response.

Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub

In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.

Can vulnerabilities in on-prem resources reach my cloud environment?

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Log4Shell - identify vulnerable external-facing workloads in AWS

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

How Transit Gateway VPC Flow Logs Help Incident & Response Readiness

In this blog, we will focus on the security and forensic aspects of Transit Gateway VPC flow logs and expand the way they can be used by organizations to respond to cloud incidents.

Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?

On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?