<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.mitiga.io</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/company/careers</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-glossary-of-terms</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-master-subscription-agreement-msa</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/news</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/resources-around-the-web</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/case-study</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/videos</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/whitepapers</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitigas-threat-hunting-provides-clarity-and-confidence-to-a-cyber-software-enterprise</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-delivers-emergency-incident-response-rapid-extortionware-resolution</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-strengthens-ir-capabilities-for-a-cloud-native-company</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/cloud-threat-hunts-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/sitemap</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-rsa-conference-2024-innovation-sandbox</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/what-is-cloud-investigation-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-enhances-zoominfos-cloud-and-saas-breach-readiness-and-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/what-is-cloud-ransomware-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/demo</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/platform</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/lemonade-chooses-mitiga-for-cloud-incident-readiness-and-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/company</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/video-testimonials</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-labs</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/helios-ai</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-labs-research-blog</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/top-cloud-threats-2025</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-cloud-attack-challenge</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/cloud-attack-challenge-demo</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/salesforce-attack</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/services</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/inside-salesforce-breach-campaigns-understanding-detecting-and-responding</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/inside-salesforce-breach-campaigns-understanding-detecting-and-responding-form</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/saas-storm-chasers-guide-a-cloud-forensics-investigation-resource</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/supercharging-your-soc-teams-cloud-capabilities</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/are-you-ready-for-a-breach-in-your-organizations-slack-instance</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/5-ways-to-reduce-the-threat-posed-by-cloud-aware-ransomware</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/cloud-incident-response-is-different-from-traditional-ir</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/protecting-your-enterprise-against-todays-most-dangerous-cyberthreats</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/cloud-threat-detection-investigation-response-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/ai-automation-and-identity-building-a-cloud-ready-soc-patrick-po-orzechowski-of-torq</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/how-to-detect-and-stop-browser-in-the-middle-attacks-with-austin-bollinger</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/wireless-attacks-and-data-exfiltration-in-secure-environments-mitiga-mic-with-brett-walkenhorst</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mastering-ci-cd-security-on-github-expert-insights-with-idan-cohen-mitiga-mic</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-visibility-crisis-in-cybersecurity-mitiga-mic-with-greg-fitzgerald</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-three-pillars-of-aidr-mitiga-mic-with-ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-journey-to-the-cloud-mitiga-mic-with-ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/irans-evolving-cyber-arsenal-what-security-teams-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-wireless-threat-no-ones-watching-mitiga-mic-with-joseph-salazar</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/what-hackers-get-wrong-and-what-defenders-miss-with-roei-sherman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/automation-vs-enablement-in-ai-security-with-alex-thaman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/forensics-at-cloud-scale-with-arif-khan</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/why-gargoyles-guard-our-clouds-art-myth-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-salesforce-risk-behind-salesloft-drift-gainsight-and-attacks-to-come-with-ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/deploy-cdr-with-cnapp</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/what-we-saw-in-2025-what-comes-next</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/complimentary-gartner-analyst-report</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-advisory-session-on-modern-cloud-attacks</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-advisory-session-on-modern-cloud-attacks-backup</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/mitiga-mic</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/mitiga-zero-impact-platform-unifies-security-across-cloud-saas-ai-and-identity</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/the-top-5-reasons-to-deploy-ai-native-cloud-detection-and-response-before-an-sspm-solution</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/ai-detection-and-response-aidr-a-zero-impact-operating-model-for-cloud-saas-ai-and-identity</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/vip-dinner-at-mgm-national-harbor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/resources/2026-cyberthreat-defense-report</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/blackstone-invests-mitiga-cloud-incident-readiness-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-25-million-series-a-funding-radically-change-cybersecurity-incident-readiness-response-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-30-million-series-b-funding-new-board-of-director-additions</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-achieves-advanced-technology-partner-status-in-the-aws-partner-network</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-cloud-incident-readiness-response-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-cto-and-co-founder-ofer-maor-named-sc-media-innovator-of-the-year-finalist</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-joins-torq-amp-alliance-program-to-accelerate-agentic-secops</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-named-enterprise-cloud-security-solution-of-the-year-in-2025-cybersecurity-breakthrough-awards-program</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-names-charlie-thomas-as-chief-executive-officer</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-reports-exceptional-growth-as-enterprises-embrace-real-time-cloud-detection-and-response-2026</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-strengthens-executive-leadership-team-with-appointment-of-chief-marketing-officer-and-chief-financial-officer-gmtav</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitiga-unveils-helios-ai-automated-secops-engine-reduces-triage-time-by-90</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/press-release/mitigas-ir2-solution-delivers-proactive-continuous-breach-investigation-powered-by-forensics-as-code-tm</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/careers/account-executive-atlanta</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/careers/account-executive-mid-atlantic</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/careers/backend-developer</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/careers/principal-cloud-security-researcher</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/careers/senior-security-operations-analyst</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/amir-gabrieli</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ariel-ainhoren</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ariel-kalman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ariel-parnes</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ariel-szarf</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/arif-khan</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/asad-saffoury</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/austin-bollinger</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/charlie-thomas</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/daniel-craig</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/doron-karmi</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/gavriel-fried</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/idan-cohen</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/jed-morley</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/john-vecchi</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/lionel-saposnik</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/matthew-stephen</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/mitiga-security-team</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/mitigas-research-team</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/nir-varon</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/or-aspir</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/or-mattatia</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/oshrat-bar</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/pablo-ariel-sirota</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/raviv-rachmiel</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/roei-sherman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/stav-ochakovski</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/tal-mozes</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/ucha-gobejishvili</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/veronica-marinov</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/yael-ben-yair</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/author-profiles/yosi-navaro</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/007-license-to-skill-p-2-slack-compromise-through-claude-code</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/3-ways-that-mitiga-outworks-your-incident-response-retainer</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/4-challenges-enterprises-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/5-common-threat-actor-tactics-in-cloud-and-how-to-combat-them</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/5-tips-to-address-the-cybersecurity-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/6-keys-to-resiliency-in-the-cloud-advice-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/7-best-practices-for-cloud-incident-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/a-mindset-shift-for-cloud-security-resilience-assume-breach</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/achieving-cloud-readiness-takes-more-than-tabletops</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ai-adoption-the-ride-so-far</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/all-the-information-you-need-to-know-to-understand-your-okta-logs-today</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/an-uninvited-guest</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/automating-aws-infrastructure-creation-with-crossplane-and-gitops</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/beat-cuba-ransomware-gang</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/beyond-standard-data-lakes-why-we-built-the-backbone-of-the-zero-impact-soc</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/beyond-the-org-chart-securing-the-interaction-graph-with-zero-impact-defense</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/breaking-down-the-microsoft-entra-id-actor-token-vulnerability-the-perfect-crime-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ceos-embrace-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/circleci-cybersecurity-incident-hunting-guide</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/claude-code-mcp-token-theft-mitm</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/claude-mythos-remediation-window-compensating-controls</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/cloud-detection-response-buyers-guide-10-capabilities</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/cloud-detection-vs-cloud-threat-hunting-what-cyber-leaders-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/cloud-threat-detection-and-response-integration-for-the-modern-soc-mitiga-and-orca-security-announce-partnership</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/combatting-cloud-ransomware-and-extortionware-guidance-for-cisos-and-teams</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/corsleak-abusing-iap-for-stealthy-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/crown-jewels-analysis-risk-of-bias</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/customer-advisory-kaseya-vsa-ransomware-incident</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/cyber-resilience-why-how-start-building-your-organization</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/cyber-trends-for-2024-what-security-leaders-should-be-executing-next</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/dangers-lateral-movement-hybrid-environment</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/deciphering-shadows-insights-and-observations-from-the-mgm-breach</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/defending-saas-cloud-workflows-supply-chain-security-insights-with-idan-cohen</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/defining-blast-radius-in-cloud-incidents</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/detecting-threats-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/eks-role-unchaining-tracing-aws-events-back-to-pods</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/former-mandiant-coo-and-president-john-watters-joins-mitiga-as-independent-board-member</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/from-breach-response-to-platform-powerhouse-ofer-maor-on-building-mitiga-for-cloud-saas-and-identity-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/from-rogue-oauth-app-to-cloud-infrastructure-takeover</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/get-ransomware-ready-protect-business-dangerous-cyberthreats</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/god-mode-in-the-shadows-when-security-tools-and-excessive-permissions-become-cloud-security-risks</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/golden-time-during-cloud-transitions</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/google-workspace-log-insights-threat-hunt</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/hackers-in-aisle-5-what-dragonforce-taught-us-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/helios-ai-why-cloud-security-needs-intelligent-automation-now</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-aws-eks-pod-identity-feature-enhances-credential-management</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-behavioral-detections-aid-healthcare-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-missing-logs-impact-cloud-security-lessons-from-microsofts-september-2024-logging-incident</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-mitiga-found-pii-in-exposed-amazon-rds-snapshots</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-okta-passwords-can-be-compromised-uncovering-a-risk-to-user-data</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-threat-actors-used-salesforce-data-loader-for-covert-api-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-to-not-pay-ransomware</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/how-transit-gateway-vpc-flow-logs-help-incident-response-readiness</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/hunting-conditional-access-policy-bypass-in-the-wild</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/iaas-vs-paas-vs-saas-what-are-the-differences</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/identifying-userdata-script-manipulation-accelerates-investigation</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/if-it-scares-you-it-might-be-good-to-try-monorepo-and-dynamically-configured-ci</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/incident-response-peacetime-value</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/inside-aws-login-exploring-a-new-phishing-method</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/inside-mitigas-forensic-data-lake-built-for-real-world-cloud-investigations</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/inside-the-ai-supply-chain-security-lessons-from-10-000-open-source-ml-projects</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/introducing-investigation-workbench</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/introducing-mitiga-integration-with-torq</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/irans-evolving-cyber-arsenal-what-security-teams-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/lacking-readiness-massive-twitch-tv-breach-competitors</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/lessons-learned-wannacry-ready-global-attack</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/level-up-your-cloud-threat-detection-investigation-and-response-strategy-with-mitiga-at-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/log4shell-everything-in-one-place</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/log4shell-forensic-investigation-in-aws</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/log4shell-identify-vulnerable-external-facing-workloads-in-aws-tutorial</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/make-cloud-attacks-yesterdays-problem-with-mitiga-at-rsa-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/measurements-that-matter-what-80-mitre-cloud-att-ck-coverage-looks-like</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/meet-mitiga-in-las-vegas-at-black-hat-def-con-and-bsides</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/microsoft-breach-by-midnight-blizzard-apt29-what-happened-and-what-now</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/misconfiguration-hidden-dangers-cloud-control-plane</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-law-enforcement-global-business-email-compromise-bec-campaign</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-rsac</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-security-advisory-abusing-the-ssm-agent-as-a-remote-access-trojan</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-security-advisory-insufficient-forensic-visibility-in-gcp-storage</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-security-advisory-lack-of-forensic-visibility-with-the-basic-license-in-google-drive</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-welcomes-amir-gabrieli-as-vice-president-of-product</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/mitiga-wins-global-infosec-award-for-cloud-threat-detection-investigation-response-tdir</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/moab-a-wake-up-call-for-enhanced-cyber-preparedness</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/national-cybersecurity-awareness-month-2024-cloud-security-recommendations</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/no-king-no-kingdom-the-agentic-soc-will-live-or-die-on-data</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/no-one-mourns-the-wicked-your-guide-to-a-successful-salesforce-threat-hunt</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/now-you-see-me-github-logs</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/now-you-see-me-workday-logs</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/overcoming-the-challenges-of-securing-saas</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/patches-vmware-vcenter-server-cloud-foundation-vulns</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/persistent-mfa-circumvention-in-an-advanced-bec-campaign-on-microsoft-365-targets</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ransomware-attacks-changed-response-needs-to-too</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ransomware-strikes-azure-storage-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ready-or-not-russian-attack-ukraine-brings-global-cybersecurity-impacts</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ready-set-respond-ensuring-compliance-with-the-sec-reporting-regulations</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ready-slack-breach-5-ways-minimize-potential-impact</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/recommendations-following-the-okta-breach</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/rippling-turning-into-a-tsunami</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/rsa-conference-2024-innovation-sandbox-competition-a-lookback-at-our-innovation</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/saas-breaches-security-cloud-apps-services</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/saas-incident-response-a-guide-for-investigators-part-one-okta-log-fields</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/scattered-lapsus-shiny-hunters-strikes-salesforce-again</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/sec-cyber-disclosure-rule-faq-what-leaders-are-asking-us</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/security-advisory-verify-aws-community-amis</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/shifting-your-cyber-investment-strategy-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/shinyhunters-and-unc6395-inside-the-salesforce-and-salesloft-breaches</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/shinyhunters-snowflake-and-rockstar-another-saas-leads-to-compromise</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/spring4shell-exploit-overview-spring-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/step-1-phish-mitiga-get-dissected</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/stop-ransomware-attackers-double-extortionware-games</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/strictly-come-detecting</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/tag-your-way-in-new-privilege-escalation-technique-in-gcp</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ten-strategies-to-communicate-cloud-security-gaps-to-leadership</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-domino-effect</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-missing-link-in-your-soc</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-only-viable-cloud-detection-and-response-approach</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-red-team-mindset-why-adversarial-testing-is-critical-for-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-rising-threat-of-ai-enabled-adversaries</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-role-of-third-party-validation-in-your-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/the-unfixable-gap-why-perfect-saas-posture-is-a-dangerous-illusion</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/think-you-have-all-the-cloud-forensics-data-you-need-you-probably-dont</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/top-5-best-practices-for-ai-powered-cloud-detection-and-incident-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/top-cybersecurity-trends-for-rsac-2026-ai-cloud-identity-and-zero-impact-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/uber-cybersecurity-incident-which-logs-do-ir-teams-need-to-focus-on</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/ultimate-cybercriminal-gift-list-undisclosed-zero-day-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/uncovering-hidden-threats-hunting-non-human-identities-in-github</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/understanding-cloud-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/understanding-gitlabs-security-threats-and-strengthening-your-preparedness</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/using-gen-ai-for-cloud-and-saas-detection-and-investigation</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/viral-outbreaks-microsoft-wormable-vulnerability-coronavirus</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/vulnerabilities-on-prem-resources-reach-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/what-cspms-cant-do-for-your-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/what-most-soc-teams-are-missing-in-their-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/what-supply-chain-attacks-teach-incident-responders</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/what-the-wiz-acquisition-of-gem-security-means-for-the-future-of-cloud-threat-detection-investigation-and-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/who-touched-my-gcp-project-understanding-the-principal-part-in-cloud-audit-logs-part-1</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/who-touched-my-gcp-project-understanding-the-principal-part-in-cloud-audit-logs-part-2</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-cloud-threats-in-healthcare-are-surging-and-how-to-combat-them</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-did-aws-replace-my-roles-arn-with-a-unique-id-in-my-policy</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-incident-response-retainers-dont-work-for-cloud-and-what-does</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-leaders-must-focus-cloud-breach-mitigation</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-the-gartner-cira-announcement-is-so-important-for-incident-response</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-traditional-incident-response-doesnt-work-cloud</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-visibility-drives-everything-in-modern-cybersecurity-with-sevcos-greg-fitzgerald</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-wi-fi-isnt-enough-joseph-salazar-on-wireless-airspace-security</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/blog/why-with-ransomware-response-knowledge-is-power</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/beyond-prevention-former-ciso-on-why-cloud-detection-and-response-cdr-is-essential-with-mitiga</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/brad-schaufenbuel</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/brandon-pinzon</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/cloud-detection-and-response-drives-cyber-resilience-yabing-wang-justworks</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/future-of-soc-patrick-orzechowski</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/jason-norred</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/justin-lachesky</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/staying-ahead-of-modern-attacks-with-aaas-gopal-padinjaruveetil</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/steve-lodin-sallie-mae</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/video-testimonials/tammy-hawkins</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/ai-and-the-feeling-of-risk-aidr-agentic-soc-and-preparing-for-ai-scale-attacks</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/ai-automation-and-identity-building-a-cloud-ready-soc-patrick-po-orzechowski-of-torq</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/ai-cloud-risk-soc-gaps-a-cisos-perspective-with-fred-kwong-ph-d</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/ai-soc-autonomous-cloud-threat-ops-torq-mitiga-webinar</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/ai-soc-tim-chase-orca</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/automation-vs-enablement-in-ai-security-with-alex-thaman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/cloud-and-cyber-insurance-experts-help-mitigate-cloud-and-saas-threats</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/cloud-threat-hunts-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/forensics-at-cloud-scale-with-arif-khan</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/get-to-know-mitiga-cloud-and-saas-threat-detection-investigation-and-response-leader</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/growth-curiosity-and-cloud-security-with-lior-nachshon</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/how-to-detect-and-stop-browser-in-the-middle-attacks-with-austin-bollinger</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/inside-salesforce-breach-campaigns</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/irans-evolving-cyber-arsenal-what-security-teams-need-to-know-now</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/mastering-ci-cd-security-on-github-expert-insights-with-idan-cohen-mitiga-mic</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/mitiga----rsa-conference-2024-innovation-sandbox</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/protecting-data-and-access-in-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/regain-control-over-your-cloud-security-with-charlie-thomas</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/salesforce-crm-misconfiguration-shinyhunters-oshrat-bar</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/slack-claude-mitiga-minutes</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/stop-silent-saas-attacks-before-they-matter</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/the-journey-to-the-cloud-mitiga-mic-with-ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/the-three-pillars-of-aidr-mitiga-mic-with-ofer-maor</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/the-visibility-crisis-in-cybersecurity-mitiga-mic-with-greg-fitzgerald</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/the-wireless-threat-no-ones-watching-mitiga-mic-with-joseph-salazar</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-hackers-get-wrong-and-what-defenders-miss-with-roei-sherman</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-a-security-data-lake-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-cira-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-cloud-incident-response-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-cloud-investigation-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-cloud-ransomware-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/what-is-extortionware-cyber-terms-explained</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/why-gargoyles-guard-our-clouds-art-myth-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/why-perfect-saas-posture-is-a-dangerous-illusion-with-john-vecchi</loc>
    </url>
    <url>
        <loc>https://www.mitiga.io/videos/why-posture-based-prevention-fails-and-how-to-prevent-breach-impact</loc>
    </url>
</urlset>