Mission Control Blog

Adrian Sanabria, a practitioner with more than 20 years of experience, shared his use case for The Cyber Defense Matrix - visualizing breaches and incidents.
- IR
.jpg)
Learn about the open source cybersecurity tools available to your organization, and why you should use them.

In a recent debate on cybersecurity predictions for 2023, panelists disagreed on plenty. But they agreed: in 2023, security will give up on users as a line of defense

Recently, we sat down with four security leaders to hear their top security predictions for 2023. Here are 12 more predictions that didn’t make the cut in the origina

The JupiterOne research team has been analyzing data from 2,285 organizations to better understand the attack surface and attack paths. This article discusses what th

Cybersecurity professionals use the term ‘attack surface’ to describe the totality of all potential entry points into their environment, and may refer to a particular
- CAASM

In “A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface,” JupiterOne researchers expand upon the 2022 State of Cyber Assets Report analysis to be

The average security team is responsible for 165,633 cyber assets and is likely to have additional ghost assets lurking in their environments. Cyber asset identificat
- CAASM

Ghosts, zombies, and shadows are not just the stuff of spooky movies and Halloween haunts. These descriptors pop up across several asset management categories: “ghost

Regulatory compliance is a necessary headache for all sizable organizations. Aside from avoiding costly government fines, reaching SOC2 or CIS compliance is a quality

While economists debate the technicalities of whether we are in a recession or not, the rest of us are left preparing ourselves for a downturn. With a wave of tech
- CSPM
- CAASM
- SecOps
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.