A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.
Learn how today’s companies are working to educate and transform their in-house abilities to meet these wide-scale cloud security challenges from this webinar, featuring Forrester Senior Analyst Jess Burn and Mitiga Co-Founder and Chief Technology Officer Ofer Maor.
When CircleCI revealed a security incident, our Threat Research team sprang into action to conduct vendor analysis and create an Incident Hunting Guide. This webinar expands on the analysis and offers recommendations on recovery.
In response to the recent CircleCI security incident, the Mitiga Research Team shares this technical guide to assist organizational threat hunting efforts.
In this webinar, Ofer Maor, co-founder and CTO at Mitiga, will walk through terminology, technologies, and history of incident response and monitoring. Register now to join Ofer on August 30.
During a critical incident, time is in short supply, and you need to make informed decisions quickly. But the facts are often elusive, and decisions are occasionally reduced all the way down to a risk-based-game of Jenga.
Cloud attacks are getting real and hitting the fan! In the past year we’ve led forensics investigations for some very interesting cloud incidents and are now ready to share them with the world. Watch this webinar with Ofer Maor, Mitiga CTO, to learn more.
Learn five ways cloud incident response is different and how a readiness approach can help you get back to business as usual fast
The mass migration of business applications to the cloud over the last few years has caused an equally rapid rise in the number of cyberattacks — along with technologies designed to prevent them. Join this webinar to learn why incidents and responses are different in the cloud, what to look at and analyze to detect incidents, and more.
In response to the recent CircleCI security incident, the Mitiga Research Team shares this technical guide to assist organizational threat hunting efforts.