Ariel is a retired Colonel of IDF’s 8200 Cyber Unit, where he served 20+ years in a wide range of roles in the areas of Intelligence, Information Technology, Offensive & Defensive Cyber Operations and Cyber Warfare. He was awarded the prestigious Israel Defense Prize for technological breakthroughs in the cyber field.

Ariel Parnes
Co-Founder and Chief Operating Officer
Cyber Resilience - Why & How to Start Building It In Your Organization
Heading
Cyber resilience is the ability of an organization or entity to continue to deliver services or solutions even in the face of adverse cyber events, such as cyberattacks. Cyber resilience combines elements of information security, business continuity, and organizational resilience.
Ready or Not: Russian Attack on Ukraine Brings Global Cybersecurity Impacts
Heading
The Russian military strategy is often described as a strategy of “active defense.” This means that their strategy includes both the preventative measures taken before a conflict breaks out and the tenets for conducting the war.
The ultimate cybercriminal gift list: undisclosed zero-day vulnerabilities
Heading
Over the last few months, everyone has been busy patching — seeking to close the loophole most learned about when the a patch was released for Log4j 2.15.0 for Java 8 users to address the remote code execution vulnerability CVE-2021-44228, a previously undisclosed zero-day vulnerability.
Rethinking zero-day vulnerabilities vs. one-days to increase readiness
Heading
Because zero-day vulnerabilities are announced before security researchers and software developers have a patch available, zero-day vulnerabilities pose a critical risk to organizations as criminals race to exploit them. Similarly, vulnerable systems are exposed until a patch is issued and applied.
Patches are not enough for VMWare vCenter Server and Cloud Foundation vulns
Heading
New vulnerabilities emerge and get published frequently, and merely applying patches is insufficient. Learn how to safeguard your data beyond just patching.
Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias
Heading
Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.
Step 1: Phish Mitiga. Step 2: Get Your Phishing-as-a-Platform Dissected by Mitiga
Heading
One of Mitiga’s employees received an email phishing for credentials. Instead of just laughing it off, our team decided to use their lunch breaks to analyze it. What we found indicates a sophisticated phishing platform that uses AWS and Oracle infrastructure to phish Office 365 email accounts.
Learn how ransomware attacks have changed — and how incident response must, too
Heading
Ransomware keeps hitting the news these days, filling headlines with stories about organizations struggling with disabled IT systems, inaccessible patient data, unavailable Wi-Fi, and general confusion. Today, organizations are facing an evolving threat, modern ransomware, also called double extortion ransomware.
Copyright © Mitiga Security Inc. All rights reserved | Terms of Use | Privacy Policy