Mission Control Blog

How does one go from hating their computer science class to becoming an engineer anyways? That’s what one of our Senior Software Engineers, Samuel Poulton, did!
- SecOps

Cybersecurity is all about cyber assets, attack surface management, and understanding cyber asset context. When companies are hacked, be it through their software
- CSPM
- CAASM

The JupiterOne team kicked off the week at fwd:cloudsec where Field Security Director Jasmine Henry shared her latest research in the session “A Tacky Graph and
- CSPM
- CAASM
- SecOps

Our new partnership helps security teams combine cloud application and workload telemetry with cyber asset information from the entire tech stack to secure cloud
- CSPM
- CAASM
- Vuln Mgmt
- IR
- SecOps

As innovative organizations scale their cloud environments, their attack surface expands in tandem. With the ways attackers operate today, the slightest, smallest gap
- CAASM
- SecOps

Summer conference season is always busy, but this year has been especially jam-packed with conference organizers cramming some of the biggest conferences in a few

When you can’t account for every single cyber asset in your digital environment and you want to conduct a security investigation or run a query to retrieve specific
- CSPM
- CAASM
- SecOps

The modern Chief Information Security Executive (CISO) is a vast, strategic, and expanding role. In a world where every organization competes on technology, the CISO

This week, we packed our green pants and sunglasses and headed over to Las Vegas for Cisco Live! and Splunk .conf22 to spend quality time with our partners, exhibit

In March we published The 2022 State of Cyber Assets Report to share how the proliferation of software-defined assets has changed the topology of attack surface
- CSPM
- CAASM
- SecOps

“The Human Element” was the theme of RSAC 2020, just as COVID-19 was making its way across the world and sending us into a global pandemic. This year, at RSAC 2022,

If these first few days of June are any indication of how the rest of the Summer of JupiterOne is going to go, I’d say we’re all in for a treat. After announcing a

It’s a big day for us here at JupiterOne. We just closed a $70M Series C funding round, achieving a $1B+ valuation, and welcomed new investors to the JupiterOne
- CAASM

Good news for JupiterOne and Splunk users! Our companies have joined forces to help make the cyber-world a safer place. This partnership gives our customers the
- SecOps
- CSPM
- CAASM

This summer is shaping up to be one of the busiest summers in years! We’re really excited to hang out with friends, old and new, at the upcoming events during what

Nothing in life is really linear. Reaching our goals often involves setbacks, changed plans, or evolving motives or values. In the moment, it can be hard to grasp you

Orphaned assets are a familiar story for every cybersecurity professional. Like something out of a horror movie, these legacy devices lurk neglected, forgotten, and
- CAASM

To paraphrase the tagline of Capital One’s credit card ads: What’s in your enterprise code? For many companies, the answer to that question has brought considerable
- CAASM

Reinvention is certainly not a new idea, especially for cybersecurity practitioners who are continuously challenged to adapt to new threats, an expanding attack

Organizations are transitioning to the cloud at a rate faster than ever. As your company’s cloud presence grows, so does the importance of your cloud security posture
- CAASM
- CSPM

“Know what you have, focus on what matters.” That’s our mantra. While that usually directs people toward taking stock of their cyber assets, it also means that you

A couple of months ago, we received the following email from AWS: Hello, You are receiving this email because AWS Lambda is making a change to the IAM policy

In the modern world, speed is everything. Customers demand constant innovation, while sudden market disruption makes agility essential for survival. To remain
- CAASM

There are two converging problems for security operations resulting in a big flaming dumpster fire - the expanding modern attack surface and an ever-growing backlog
- CAASM

Complete cyber asset inventory and visibility is foundational to any security program and strategy. We’ve written a number of pieces that share this sentiment
- CAASM
- SecOps

You’ve identified and collected all your cyber assets into one place. Now what? There are thousands, or even hundreds of thousands assets and potentially countless
- CAASM
- SecOps

As the scope of the cyber hygiene challenge outpaces the expert resources available, security teams are losing ground in the effort to protect their organization
- CAASM

Cybersecurity alert fatigue is an issue that is long overdue for a real solution. The average cybersecurity team is facing a backlog of 120,561 findings and alerts
- CSPM
- CAASM
- SecOps

Last month, Yvie Djieya wrote a blog post describing how JupiterOne’s security team manages “meeting evidence” as code. Yvie covered the difficulty of managing
- SecOps

Complete cyber asset inventory and visibility is foundational to any security program and strategy. We’ve written a number of pieces that share this sentiment
- CAASM

Digital transformation has created remarkable and irreversible growth in the cyber asset landscape. Each business shift towards digital workflows has yielded a steady
- CAASM

There’s nothing better than hiring an engineer that takes true pleasure in solving highly complex, brain-bending problems. That’s what we saw when we talked to Ben

Generating a software bill of materials (SBOM) is no small feat. In this post, I’ll walk through the steps I used to generate our SBOM when Sounil Yu joined the
- CAASM
- SecOps

In this post, I’m sharing my favorite resources to stay on top of all the things cloud, security, and self-improvement—because mental well-being is crucial to success
- CSPM

JupiterOne has a much broader definition of cyber assets than other security vendors, covering more than just IP addresses, devices, and internet facing-assets.

In the current microservice landscape, there are more than enough automation tools and infrastructure as code (IaC) solutions to make deployments swift and effortless
- CAASM

I started JupiterOne with two strong core beliefs that shape how to address the technical challenges I was facing and overall battles in the cybersecurity industry as
- CSPM
- CAASM
- SecOps

Security is a basic human right, but many security teams struggle to answer even seemingly basic questions about attack surface or blast radius due to poor visibility
- CSPM
- CAASM
- SecOps

You are likely familiar with the cybersecurity adage: “You can’t protect what you don’t know about.” It’s common-sense enough wisdom, but if we’re being honest, we
- CAASM

Individuals in STEM are often described as innately methodical, detail-oriented, and curious. However, their creative, artistic qualities are the ones that make them

In a world where cybersecurity threats evolve and proliferate at dizzying speed, a confusing and disordered cybersecurity landscape makes it all too difficult to
- CAASM
- GRC
- SecOps

Every company has a workplace culture and a security culture. Many people would define the former as “flexible PTO and cold brew on tap” (which, of course, is a gross

Auth0 helps enterprise companies solve the most complex, large-scale identity use cases with its extensible and developer-friendly solution. To get to that level of
- CAASM
- SecOps

If you’re anything like me (which I hope you’re not), or let’s say if you’re anything like my mind, you spend 75% of your time overthinking. You reach for the closest
- SecOps

We are honored to announce our company founder and Chief Executive Officer Erkang Zheng, named as Cybersecurity CEO of the Year-North America by the Cybersecurity

Many companies invest in compliance activities to follow various laws and regulations but not necessarily to improve their overall security posture. Whether you are
- GRC

Eight years ago I took over the OWASP Podcast from Jim Manico, originator of the project. In that time 160 episodes have been published, with over 500,000 downloads

As we prepare to celebrate Lunar New Year, we offer you a personal story of what the new year tradition means to Erkang Zheng, CEO of JupiterOne.

Recently, life has been chaotic. For two years, events have shattered our perspective on what work, health, and community means to us. As we try to sleep through this
- CAASM
- CSPM

Today, millions of people worldwide are becoming aware of how their personal data is collected, shared, and monetized in our modern digital economy. Studies show that
- CAASM
- CSPM
- GRC

If you couldn’t tell from the video, we are so excited to launch the AskJ1 Community! By bringing together our users, team, and security professionals at large, we’re

As we continue to build our security teams at JupiterOne, we asked Kenneth Kaye, Security Automation Architect, to describe our Red Team approach, and Chasen
- CSPM
- SecOps

Engineers are the individuals who sit in the magical area between an exciting idea and a promising product in any organization. JupiterOne is lucky enough to have

Most security practitioners admit they spend their free time upskilling. Learning can occur in settings ranging from the practitioner’s home labs to security

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from a chapter by Sounil Yu.
- CAASM
- SecOps

We’ve all heard of “Red Teams” and “Blue Teams” when it comes to cybersecurity. But what about the “Purple Team”, the “Yellow Team” or the “Blue Team”. What are those

On January 9, 2022, journalist and researcher Ax Sharma wrote an article, "Dev corrupts NPM libs 'colors' and 'faker' breaking thousands of apps".

The cybersecurity forecast for 2022: More of the same—only worse. Yes, the sophistication of cyberattacks is growing by the minute. Unfortunately, so are the rewards
- CAASM
- CSPM

It's that time of year where I poll my friends to see what kind of cool downloads and resources they found in 2021. Hopefully, you'll see something you like.

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from a chapter by Yolonda Smith.
- CAASM
- SecOps
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.