Hidden Dangers in the Cloud Control Plane | Mitiga

Heading

The cloud control plane can be difficult to understand. In this article we examine attack scenarios and how to harden your GCP environment. Learn more.

7 Best Practices for Cloud Incident Response

Heading

Regardless of the specific details of a breach, organizations must be prepared to respond when one occurs. The more organizations move applications and services to the cloud, the more it is important to plan for cloud incident response. These seven best practices will help you get started.

10 Recommendations for Your Organization to Increase Readiness Following the Okta Breach

Heading

We all woke up recently to a security nightmare. Okta, an industry leader in identity and access management is potentially breached and the impact for the industry may be very high. Here are 10 actionable recommendations you can share, but please let us know if you have more so that we can add them to this list.

Mitiga Cooperates with Law Enforcement on a Global BEC

Heading

Mitiga has worked with a law enforcement investigation to prevent criminals from impersonating Office 365 executives and redirecting wire transfers. Learn more.

What is the Spring4Shell exploit? An overview of the Spring vulnerability

Heading

Spring is a Java framework for dependency injection and Model-View-Controller (MVC) web development. Spring is a very popular framework; over 6,000 other libraries use the "spring-beans" library (according to Maven Central). Spring4Shell, a new exploit in Spring, was just disclosed.

Understanding Your Okta Logs to Hunt for Evidence of an Okta Breach

Heading

Understand your Okta system logs with this comprehensive guide, helping you enhance security, monitor activity, and respond effectively to incidents.

Here's Why Traditional Incident Response Doesn’t Work in the Cloud

Heading

Traditional incident response (IR) learned from on-premises investigations doesn’t work in the cloud. Today's threat actors are finding misconfigurations and vulnerabilities to allow them to penetrate cloud environments.

Ready or Not: Russian Attack on Ukraine Brings Global Cybersecurity Impacts

Heading

The Russian military strategy is often described as a strategy of “active defense.” This means that their strategy includes both the preventative measures taken before a conflict breaks out and the tenets for conducting the war.

Understanding Lateral Movement Attacks in Hybrid Environments

Heading

Learn how lateral movement attacks pose serious risks in on-prem, cloud, or hybrid environments, and discover effective strategies to mitigate these threats.