Blog
Sharing Mitiga’s latest threat intelligence and research, cloud IR insights, and company news
Overcoming the Challenges of Securing SaaS
Generally speaking, when most CISOs think about their cloud security, they’re keyed into their cloud infrastructure held at big providers like AWS, Azure, and GCP. Their typical focus is on securing virtual machines, storage and networks that run on cloud infrastructure. All of this is hugely important.
Why Did AWS Replace My Role’s ARN with a Unique ID in My Policy?
Understand why AWS replaced your role's ARN with a unique ID in your policy and learn how it affects your IAM management and cloud security practices.
What Most SOC Teams are Missing in Their Cloud Security
For decades, Security Operations Center (SOC) have been at the foundation of organizational security and risk mitigation. SOCs perform critical operations, helping to keep systems updated and handle the day-to-day monitoring of organizational IT.
Microsoft Breach by Midnight Blizzard (APT29): What Happened?
Understand the Midnight Blizzard Microsoft breach by APT29, what happened, and key steps organizations should take to strengthen their defenses.
What CSPMs Can't Do for Your Cloud Security
In recent years, Cloud Security Posture Management (CSPM) tools have become increasingly popular, and with good reason. The posture management capabilities a CSPM provides can help an organization better understand cloud configuration to prevent potential security incidents.
MOAB: A Wake-Up Call for Enhanced Cyber Preparedness
In a digital landscape fraught with uncertainty, the discovery of the "Mother of All Breaches" (MOAB) serves as an unsettling foreshadowing of other challenges that await. With a massive cache of 26 billion records, this digital beast has again brought cybersecurity to the forefront for enterprises and requires security professionals to wrestle with a new set of evolving circumstances.
Mitiga and Kroll Partner to Deliver the Industry’s Most Comprehensive Incident Response
The combination of Mitiga’s leading CIRA offering and Kroll’s global cyber incident response and litigation support ensures today’s hybrid enterprises have access to unmatched resources during critical moments
Understanding GitLab's Security Threats and Strengthening Your Preparedness
GitLab, a cloud-based, open-source Git repository used by over 38,000 companies around the globe, plays a pivotal role in modern software development. For the organizations that rely on it, it’s a vital collaboration tool and innovation enabler, allowing developers to swiftly test, monitor, and deploy code and housing the full CI/CD pipeline.
Cyber Trends for 2024: What Security Leaders Should be Executing Next
As we hurtle into this new year, it’s already clear that there is an evolving set of cyber risks that organizations will need to contend with successfully to manage threats and grow their organizational resilience in 2024. Below, I’ll outline three of the biggest ones, sharing recommendations and execution checklists that can help enterprises enhance their threat readiness and elevate security postures as the threat landscape continues to evolve.