We’re proud to report that at the open of today’s RSAC24, Mitiga was awarded the Publisher's Choice, Cloud Threat Detection Investigation & Response (TDIR) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. This news closely follows Mitiga being named a 2024 RSA Innovation Sandbox finalist.  

“We are incredibly honored to receive the Publisher's Choice for Cloud Threat Detection, Investigation & Response at the 12th Annual Global InfoSec Awards,” stated Tal Mozes, CEO and co-founder of Mitiga. “This prestigious award from Cyber Defense Magazine validates our mission to redefine how enterprises can achieve better control over their cloud environment's security and resilience. By equipping SOC teams with the most advanced tools for visibility, detection, investigation, and response, Mitiga is setting a new standard in cloud security, ensuring rapid and effective threat management for enterprises worldwide.”

It’s been an exciting journey to reach this point, because while Mitiga’s start was in cloud incident response (IR), it quickly became apparent that SecOps teams not only needed tooling for cloud IR capabilities, but also to enable detection in their complex cloud ecosystems. We distilled our expertise into a platform that empowers SecOps professionals with rich, fast context to detect cloud threats, cutting down the alert noise and replacing it with the insights that help analysts spend their limited time wisely on the most critical threats.

We also created our Investigation Workbench to help those same teams to automatically construct detailed timelines across their cloud footprints—whether they have cloud and IR expertise, or not. It’s advancements like these that help us supercharge investigation for the cloud era. Our leading-edge solutions empower enterprises to act against cloud threats, decreasing the time it takes to detect, investigate, and respond, end-to–end, from 200 days to minutes.

“Mitiga stands out for embodying the key qualities we judges seek in award winners: a proactive stance in understanding and addressing tomorrow’s threats today, delivering cost-effective solutions that fit our current economic climate, and driving innovation in unexpected ways. I believe Mitiga’s approach not only mitigates cyber risks but also strategically positions organizations to anticipate and counteract the next breach. Their commitment to these principles is what sets them apart in the cybersecurity landscape,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

To learn more about our detection, investigation, and response capabilities and where they fit into today’s tech stack, check out this recent report from ESG, or reach out to our team for a demonstration.

LAST UPDATED:

September 24, 2024

Don't miss these stories:

Frost & Sullivan’s Latest 2025 Frost Radar: The Need for Runtime Cloud Security in a Cloud-First World

Cloud breaches rose 35% year over year in 2024, and legacy security tools are failing to keep up. The rapid sprawl of multi-cloud and SaaS has shattered the assumptions baked into legacy, on-prem, and endpoint-focused security stacks, which can’t keep pace with today’s dynamic attack surfaces.

The Remote Worker Scam: Understanding the North Korean Insider Threat

Recent investigations have uncovered a sophisticated scheme by North Korean operatives to exploit remote work policies in the U.S. tech industry.

Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2

This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.

Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive

Mitiga's advisory highlights critical gaps in forensic visibility with Google Drive's Basic license, affecting security and incident investigations. Read on.

Cloud Detection vs Cloud Threat Hunting: Insights for Cyber Leaders

As cyber threats evolve, security teams need to detect and mitigate cloud attacks. Learn why cloud detection and threat hunting are key defense strategies.

Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots

A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.