JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards

by

We are starting to make waves in the cybersecurity universe. Turns out, people love us and we are crushing this awards season (like Bong Joon-Ho's Parasite).

Anyway, we are extremely proud to share the following awards and announcements from the prestigious Black Unicorn Awards this year at Black Hat:

  • Our very own CISO, Sounil Yu, was officially named Winner of the Top 10 CISOs of 2021.
  • JupiterOne was named a Finalist as a “Baby Black Unicorn”
  • Sounil Yu does it again! He was also named a Finalist for Top 10 Cyber Security Experts.

On a more serious note, this is incredible news and validation for our team here at JupiterOne. The whole JupiterOne team is thrilled to congratulate Sounil Yu for being named a Winner as a Top 10 CISO of 2021 and also to see JupiterOne recognized as a Baby Black Unicorn. There’s a lot of work to be done before we reach that $1 billion dollar market valuation but we welcome the challenge! We are part of a community that is proactively creating a cybersecurity platform that is more people-centric and fundamental to our customer needs.

Thank you for your continued support in our mission.

Onward and upward.

Read the full press release here for the details.

JupiterOne Team
JupiterOne Team

The JupiterOne Team is a diverse set of engineers and developers who are working on the next generation of cyber asset visibility and monitoring.

Keep Reading

Introducing Continuous Controls Monitoring (CCM) | JupiterOne
November 7, 2024
Blog
Introducing Continuous Controls Monitoring (CCM)

CCM delivers real-time visibility, proactive risk management, and streamlined compliance for security.

Now Available: JupiterOne’s Public Postman Workspace | JupiterOne
October 31, 2024
Blog
Now Available: JupiterOne’s Public Postman Workspace

Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.

Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets | JupiterOne
October 16, 2024
Blog
Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets

Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.