We’re proud to report that at the open of today’s RSAC24, Mitiga was awarded the Publisher's Choice, Cloud Threat Detection Investigation & Response (TDIR) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. This news closely follows Mitiga being named a 2024 RSA Innovation Sandbox finalist.  

“We are incredibly honored to receive the Publisher's Choice for Cloud Threat Detection, Investigation & Response at the 12th Annual Global InfoSec Awards,” stated Tal Mozes, CEO and co-founder of Mitiga. “This prestigious award from Cyber Defense Magazine validates our mission to redefine how enterprises can achieve better control over their cloud environment's security and resilience. By equipping SOC teams with the most advanced tools for visibility, detection, investigation, and response, Mitiga is setting a new standard in cloud security, ensuring rapid and effective threat management for enterprises worldwide.”

It’s been an exciting journey to reach this point, because while Mitiga’s start was in cloud incident response (IR), it quickly became apparent that SecOps teams not only needed tooling for cloud IR capabilities, but also to enable detection in their complex cloud ecosystems. We distilled our expertise into a platform that empowers SecOps professionals with rich, fast context to detect cloud threats, cutting down the alert noise and replacing it with the insights that help analysts spend their limited time wisely on the most critical threats.

We also created our Investigation Workbench to help those same teams to automatically construct detailed timelines across their cloud footprints—whether they have cloud and IR expertise, or not. It’s advancements like these that help us supercharge investigation for the cloud era. Our leading-edge solutions empower enterprises to act against cloud threats, decreasing the time it takes to detect, investigate, and respond, end-to–end, from 200 days to minutes.

“Mitiga stands out for embodying the key qualities we judges seek in award winners: a proactive stance in understanding and addressing tomorrow’s threats today, delivering cost-effective solutions that fit our current economic climate, and driving innovation in unexpected ways. I believe Mitiga’s approach not only mitigates cyber risks but also strategically positions organizations to anticipate and counteract the next breach. Their commitment to these principles is what sets them apart in the cybersecurity landscape,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

To learn more about our detection, investigation, and response capabilities and where they fit into today’s tech stack, check out this recent report from ESG, or reach out to our team for a demonstration.

LAST UPDATED:

September 24, 2024

Don't miss these stories:

From Rogue OAuth App to Cloud Infrastructure Takeover

How a rogue OAuth app led to a full AWS environment takeover. And the key steps security leaders can take to prevent similar cloud breaches.

CORSLeak: Abusing IAP for Stealthy Data Exfiltration

When people talk about “highly restricted” cloud environments, they usually mean environments with no public IPs, no outbound internet, and strict VPC Service Controls locking everything down.

Defending SaaS & Cloud Workflows: Supply Chain Security Insights with Idan Cohen

From GitHub Actions to SaaS platforms, supply chain threats are growing. Hear Mitiga’s Idan Cohen and Field CISO Brian Contos explore real-world compromises, detection tips, and strategies to strengthen your cloud security.

Inside Mitiga’s Forensic Data Lake: Built for Real-World Cloud Investigations

Most security tools weren’t designed for the scale or complexity of cloud investigations. Mitiga’s Forensic Data Lake was.

Measurements That Matter: What 80% MITRE Cloud ATT&CK Coverage Looks Like

Security vendors often promote “100% MITRE ATT&CK coverage.” The reality is most of those claims reflect endpoint-centric testing, not the attack surfaces organizations rely on most today: Cloud, SaaS, AI, and Identity.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.