Mitiga
@mitiga.bsky.social
27 followers 170 following 130 posts
Let Them Come. Mitiga is the leader in AI-Native Zero-Impact Breach Mitigation – the only approach that ensures cyberattacks cause no business impact.
Posts Media Videos Starter Packs
Are AI models moving beyond pattern recognition?

In this Mitiga Mic segment, Brian Contos and Alex Thaman of Andesite explore how large models can plan, query, and problem-solve across complex data. Even running investigations step-by-step like a human analyst might.
Visibility. Speed. Resilience.
Steve Lodin of Sallie Mae talks to Brian Contos about what it takes to prevent and stop cloud and SaaS breach impact in the age of AI. https://loom.ly/fJq_ixQ
- YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
youtu.be
Legacy SecOps tools weren’t built for this speed or scale. SOCs face nonstop alerts, blind spots across Cloud and SaaS, and too many manual steps between detection and response. https://loom.ly/SkfW9Mc
Volume isn’t slowing down. The attackers aren’t either.

In this clip from #MitigaMic, we dig into what that means for security leaders today. Find the full ep on YouTube.
Mitiga was just named Enterprise Cloud Security Solution of the Year by the 2025 CyberSecurity Breakthrough Awards.

SecOps teams know posture-based prevention alone no longer works. Mitiga helps them preemptively take control. https://loom.ly/AIpjmnU
Prevention has failed.

Attackers will always find a way past posture-based prevention. The promise of “zero breaches” is broken.

It’s time for a new promise: Zero Impact.

Mitiga. Let them come.
At Hou.Sec.Con, Adam Landa + Matt Schwuchow dug into cloud + SaaS security with attendees. And Ariel Parnes reminded the crowd: Zero Breach is an empty promise. In Texas, everything’s bigger—including the impact when prevention fails.
We’ll be at SecureMaine 2025 next week as a sponsor. While the agenda covers much, we see that the story is clear: cloud, SaaS, AI infrastructure, and identity are where attackers move fastest.

And where organizations need to be ready. https://loom.ly/2c2GzmY
It doesn't need to be this easy. Not all MFA was created equal.

Austin Bollinger says you're better off ditching SMS and using other authenticator options. Here's why. #MitigaMic
Everything talks these days, right? Whether a trusted browser extension or trying out tools with your GitHub repository. Brian Contos and Austin Bollinger continue their conversation about browser-in-the-middle attacks and more in this episode of #MitigaMic.
Always on. Always ready.

Chief Information Security Officer in the Software Industry gives Mitiga 5/5 Rating in @Gartner Peer Insights™ Cloud Investigation and Response Automation (CIRA) Market.

Read the full review here: https://loom.ly/b0WFI7k #gartnerpeerinsights
On paper, "highly restrictive environments" sound bulletproof. Take it to the bank. We're done.

Ariel Kalman, a senior cloud security researcher at Mitiga, finds that even when there's no door or window, there's always a way to get stuff out.

🔗 https://loom.ly/qd9plHo

A Tor exit node, you say? Best look into that.
Ofer Maor shows how Mitiga surfaces anomalous actions to get the full story. https://loom.ly/0awUw38
Following a Farmer's Insurance breach affecting 1.1 million people carried out by the ShinyHunters, Ariel Parnes writes 5 key lessons for the insurance industry. https://loom.ly/xb9-F5M
What's your cybersecurity origin story?

On this episode of Mitiga Mic, host and Mitiga Field CISO Brian Contos talks with Austin Bollinger, Principal Incident Responder at Mitiga, about browser-in-the-middle (BitM) attacks, a threat that bypasses traditional defenses.
The patching may be done, but the risk lingers.

While Microsoft swiftly patched the flaw, the lack of historical visibility means defenders still can’t be sure whether it was used in the past, the CSO Online article says, quoting Mitiga's Roei Sherman. https://loom.ly/g0LfEHo
Entra ID vulnerability exposes gaps in cloud identity trust models, experts warn
Though patched, the flaw underscores systemic risks in cloud identity systems where legacy APIs and invisible delegation mechanisms can be exploited without detection, prompting calls for stronger governance and telemetry.
www.csoonline.com
Sure you could do that. But what else can you do in 15 minutes? Meet the challenge for zero-impact mitigation of cloud attacks and stop cloud attacks before they matter. https://loom.ly/8UkBfuQ
Burst. Burst. Burst. Small amounts of data exfiltrated from a rotating cast of IP addresses. This is how #UNC6040 makes off with #Salesforce data without raising flags.

Watch more from this on-demand webcast: https://loom.ly/0awUw38
Steven Vaughan-Nichols writes about the state of Zero Trust for @spiceworks.bsky.social. With a decade of hype behind us, reliance on the famous buzzword needs to be a way of life, not a product feature. https://loom.ly/TFoB6os
Available immediately on demand: Join Ofer Maor in a quick 35 minute journey through the avalanche of Salesforce breaches, including the Salesloft Drift compromise and vishing-based intrusions, as well as our detections and insights on GitHub attacks. https://loom.ly/0awUw38