Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Top 5 JupiterOne Articles from 2021
December 29, 2021
Blog
The Top 5 JupiterOne Articles from 2021

JupiterOne published hundreds of blog articles in 2021, including some by our friends in the community. We checked to see how the community voted "with its eyes" this

Mark Miller
Understanding Suspicious Updates to AWS Managed Policies
December 28, 2021
Blog
Understanding Suspicious Updates to AWS Managed Policies

As you stand knee deep in the water watching waves form, you set your sights on the perfect one to ride into shore. “This is it!”, you think. “It’ll carry me to shore

  • CAASM
  • SecOps
Chasen Bettinger
Log4Shell Remediation Visibility with JupiterOne and Log4Shell_Sentinel
December 27, 2021
Blog
Log4Shell Remediation Visibility with JupiterOne and Log4Shell_Sentinel

If you’re neck-deep in Log4Shell remediation and wanting the assurance of an automated process to ensure your hosts are patched and stay patched, the following

Erich Smith
Potential CloudFront/S3 takeover risks
December 23, 2021
Blog
Potential CloudFront/S3 takeover risks

We recently helped a customer identify some potential CloudFront/S3 takeover risks. You can find the details of the risk described in the article, "Simple Route53/Clo

  • CSPM
  • CAASM
  • SecOps
Erkang Zheng
The Debate: Should You Build or Buy CAASM?
December 21, 2021
Blog
The Debate: Should You Build or Buy CAASM?

Should you build or buy a CAASM solution? It’s a valid question, especially in an ecosystem rich with open source and low-cost security tools. You don’t need

  • CAASM
Jasmine Henry
Lessons from Log4Shell: Mapping Code Dependencies and Investigating Code Deployments
December 20, 2021
Blog
Lessons from Log4Shell: Mapping Code Dependencies and Investigating Code Deployments

Let me open by saying that If you are currently remediating the Log4Shell vulnerability in your environment, this article is not designed for you, although some thing

  • CAASM
Akash Ganapathi
CAASM Should Be an Early Security Investment in Every CISO's Playbook
December 15, 2021
Blog
CAASM Should Be an Early Security Investment in Every CISO's Playbook

It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also

  • CAASM
Jasmine Henry
Rapid Response: Search for malicious discord tokens in the npm repository
December 14, 2021
Blog
Rapid Response: Search for malicious discord tokens in the npm repository

Detect and respond to malicious Discord tokens in npm packages. Learn proactive security measures to protect your development environment.

JupiterOne Team
Book Preview: Metrics that Matter - The business context of cyber risk management
December 13, 2021
Blog
Book Preview: Metrics that Matter - The business context of cyber risk management

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from a chapter by Keyaan Williams.

  • CAASM
Keyaan Williams
Book Preview: Reinventing the Cybersecurity Workforce
December 9, 2021
Blog
Book Preview: Reinventing the Cybersecurity Workforce

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

Sushila Nair
Why I Quit Being a JupiterOne Customer...
December 7, 2021
Blog
Why I Quit Being a JupiterOne Customer...

Over the past 19 months, I was empowered to create a security and compliance function at a Seattle startup. I was a pretty successful Security Director by most

Jasmine Henry
JupiterOne Wins Start-up of the Year at BIG Awards for Business
December 7, 2021
Blog
JupiterOne Wins Start-up of the Year at BIG Awards for Business

The Business Intelligence Group’s annual BIG Awards for Business results are in and we are so excited to share that JupiterOne has been recognized as “Start-up of the

JupiterOne Team
Podcast: Talking about CAASM and Community
December 3, 2021
Blog
Podcast: Talking about CAASM and Community

Christian Buckley from the CollabTalk Podcast reached out to me to discuss building communities, given my involvement in supporting massive initiatives within

  • CAASM
Mark Miller
A Nation State Attack Surface: Software Supply Chains
December 1, 2021
Blog
A Nation State Attack Surface: Software Supply Chains

Today’s digital supply chains are a continuously growing and dynamic ecosystem of web-based services, applications, and IT assets. These ecosystems are enabled by an

  • CAASM
  • SecOps
Hema Nair
The Future of Compliance is Continuous
November 24, 2021
Blog
The Future of Compliance is Continuous

The future of compliance is continuous. Since the beginning of technology auditing, auditors have had to rely upon spot-checking to validate whether the entity being

  • CAASM
  • GRC
  • SecOps
Kenneth Kaye
Book Preview: Knowledge without Action is a Wasted Opportunity
November 23, 2021
Blog
Book Preview: Knowledge without Action is a Wasted Opportunity

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

Jennifer Czaplewski
Top 5 Reasons Your Attack Surface Is Growing Along with Your Cyber Assets
November 18, 2021
Blog
Top 5 Reasons Your Attack Surface Is Growing Along with Your Cyber Assets

It’s a good time to be a hacker. Evolving IT architectures and workplace models now offer more entry points than ever for an attack, while simultaneously making it

  • CSPM
  • CAASM
  • GRC
  • SecOps
Jennie Duong
Infographic: The State of Cyber Asset Management
November 18, 2021
Blog
Infographic: The State of Cyber Asset Management

Cyber asset management is now a critical component of an organization’s cybersecurity hygiene and posture management. The more cyber assets in an organization’s

  • CAASM
  • CSPM
  • SecOps
Jennie Duong
J1 ​​Rapid Response: MacOS Zero-day and water-hole attack. Are you vulnerable? How to tell in minutes.
November 17, 2021
Blog
J1 ​​Rapid Response: MacOS Zero-day and water-hole attack. Are you vulnerable? How to tell in minutes.

Zero-day vulnerabilities are the ones that place the most stress on every security team, regardless of the size of the organization. Watering-hole (also known as

  • CAASM
Kenneth Kaye
Cisco and JupiterOne Partnership Goes Beyond Traditional Cloud Security
November 15, 2021
Blog
Cisco and JupiterOne Partnership Goes Beyond Traditional Cloud Security

Fireside chat: Cisco Sr. Director of Product Management for Cloud Security Munawar Hossain, JupiterOne CEO Erkang Zheng and CMO Tyler Shields discuss the new partners

  • CSPM
  • CAASM
Erkang Zheng
Network Segmentation, Visibility and Third-Party Risk Assessment
November 10, 2021
Blog
Network Segmentation, Visibility and Third-Party Risk Assessment

When Colonial Pipeline CEO Joseph Blount testified before the US Congress, he revealed that the attack was completely avoidable; Blount admitted that Darkside gained

  • CAASM
  • SecOps
Steve King
Book Preview: Hardening the Value Stream by Bryan Finster
November 3, 2021
Blog
Book Preview: Hardening the Value Stream by Bryan Finster

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

  • SecOps
Bryan Finster
GitHub Secrets Management with JupiterOne
October 27, 2021
Blog
GitHub Secrets Management with JupiterOne

JupiterOne recently added support for ingesting GitHub Org, Repo, and Environment secrets.

  • CAASM
Erich Smith
Book Preview: Modern Cybersecurity, Preface
October 20, 2021
Blog
Book Preview: Modern Cybersecurity, Preface

On October 19, 2021, we published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". Over the next few weeks, we'll be publishing excerpts from the

  • CSPM
  • CAASM
Erkang Zheng
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future
October 19, 2021
Blog
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future

The speed of change and the tools of adversaries make it extremely hard to envision a long-term, executable vision for the future of security. However, without ponder

  • CAASM
Mark Miller
Our Company Retreat: Camp JupiterOne
October 18, 2021
Blog
Our Company Retreat: Camp JupiterOne

Team retreats are an excellent way to bring a company together. For a remote-first company like JupiterOne, I’d say they are essential. It is a great way to strengthe

Melissa Pereira
Google Cloud Storage Access Analysis
October 14, 2021
Blog
Google Cloud Platform (GCP) Storage Access Analysis

Identity and Access Management (IAM) for Google Cloud uses IAM Role Bindings, which link three constructs together

  • IAM
Michael Knoedel
How To Get Started With IT Security Policies and Procedures
October 13, 2021
Blog
How To Get Started With IT Security Policies and Procedures

You open your email and there it is. Finally, the company that you really wanted to work for has extended you an offer. You feel a rush of adrenaline as you open it

  • GRC
Jeffrey Lee
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup
October 12, 2021
Blog
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup

I’m the Director of Cybersecurity at Esper, a cloud-native startup that offers powerful cloud tooling for Android device deployment and application management at scal

  • GRC
Jasmine Henry
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper
October 5, 2021
Blog
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper

Our customers are at the core of everything we do at JupiterOne. And every security strategy and journey is different for every customer. JupiterOne is starting a mon

JupiterOne Team
Boardroom Conversations on Security: Part 7
October 4, 2021
Blog
Boardroom Conversations on Security: Part 7

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
JupiterOne is a Finalist for NC Tech Cybersecurity Award
September 29, 2021
Blog
JupiterOne is a Finalist for NC Tech Cybersecurity Award

We’re honored to share that JupiterOne has been recognized for its innovation, excellence, and growth as part of the 2021 NC TECH Awards program. JupiterOne is a fin

Melissa Pereira
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected
September 27, 2021
Blog
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected

Last week, we published an article on a recent Chrome zero-day exploit (worth reading if you want see the history of the issue). There was a new announcement this

  • CAASM
Sounil Yu
Boardroom Conversations on Security: Part 6
September 27, 2021
Blog
Boardroom Conversations on Security: Part 6

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
Future of Cloud Security - Cyber Security Summit Charlotte
September 23, 2021
Blog
Future of Cloud Security - Cyber Security Summit Charlotte

In this panel originally recorded for CyberSecurity Summit 2021 in Charlotte, speakers from JupiterOne, Gigamon, Duo Security, Sonatype, Vectra and Center for

  • CSPM
  • CAASM
Akash Ganapathi
2 Attack Vectors are Forcing Changes in how to Secure Software
September 22, 2021
Blog
2 Attack Vectors are Forcing Changes in how to Secure Software

Cyber criminals have upped their game in the past two years to take advantage of a world distracted in its battles with a global pandemic. Cybercrime is growing conti

Hema Nair
Boardroom Conversations on Security: Part 5
September 20, 2021
Blog
Boardroom Conversations on Security: Part 5

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
J1  Rapid Response: Travis CI Flaw
September 17, 2021
Blog
J1  Rapid Response: Travis CI Flaw

On Monday, September 13, Travis CI put out a security bulletin obliquely mentioning a security problem. “As a reminder from the Support Team, cycling your secrets is

Austin Kelleher
Design Update: Compliance App 2.0
September 15, 2021
Blog
Design Update: Compliance App 2.0

The team at JupiterOne was well underway building version 2.0 of our Compliance App when I joined the company this summer. The primary motivation for the work on 2.0

Patrick Morgan
Boardroom Conversations on Security: Part 4
September 13, 2021
Blog
Boardroom Conversations on Security: Part 4

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
SINET 16 Awards Winner: JupiterOne
September 10, 2021
Blog
SINET 16 Awards Winner: JupiterOne

We are honored to receive this significant industry recognition as the 2021 SINET 16 Innovators Award winner. We know that the market competition is fierce, so we

JupiterOne Team
De Morgan's Law in JupiterOne
September 8, 2021
Blog
De Morgan's Law in JupiterOne

If you recently read about the breaking fix JupiterOne introduced to maintain J1QL language correctness as defined by De Morgan's Law you may have found yourself in

Tony Ramirez
The Absolute Minimum Every Developer Must Know about AWS Security
September 7, 2021
Blog
The Absolute Minimum Every Developer Must Know about AWS Security

The cloud is becoming increasingly popular. It is the driving force of the modern world, and engineers are starting to shift their careers accordingly. Whatever your

  • CAASM
Nishant Thorat
Boardroom Conversations on Security: Part 3
September 6, 2021
Blog
Boardroom Conversations on Security: Part 3

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
CAASM is the Future... CSPM is Dead
September 1, 2021
Blog
CAASM is the Future... CSPM is Dead

Beyond the classic Cloud Security Posture Management (CSPM) tools like Dome9, DivvyCloud, etc. now even infrastructure and workload scanners claim CSPM as part of the

  • CAASM
  • CSPM
Akash Ganapathi
Boardroom Conversations on Security: Part 2
August 30, 2021
Blog
Boardroom Conversations on Security: Part 2

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards
August 26, 2021
Blog
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards

We are excited to announce that JupiterOne has been selected as a Winner in the WorldFestival 2021 Innovation Awards in the Cloud Computing category! We are extremely

JupiterOne Team
My Bucket, My Data! (or is it?)
August 24, 2021
Blog
My Bucket, My Data! (or is it?)

AWS S3 has long become a standard for storing file object data. Despite the many efforts in making S3 secure, we continue to see data in private buckets exposed or ex

  • CAASM
Erkang Zheng
Boardroom Conversations on Security: Part 1
August 23, 2021
Blog
Boardroom Conversations on Security: Part 1

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
Compliance is cumbersome, but cloud can help
August 18, 2021
Blog
Compliance is cumbersome, but cloud can help

Guest author Chris Hughes, CISO and Co-Founder of Aquia, offers a view of the "Shared Responsibility Model".

  • CSPM
Chris Hughes
JupiterOne Launches Query Anywhere
August 11, 2021
Blog
JupiterOne Launches Query Anywhere

This week JupiterOne launched Query Anywhere. As you might guess, this feature will allow J1 users to access the core 'search for anything' functionality of J1QL no

Chum Wongrassamee
Podcast: CYA - Cover Your Assets with Chris Roberts
August 9, 2021
Blog
Podcast: CYA - Cover Your Assets with Chris Roberts

A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talking about. Everyday

  • CAASM
  • SecOps
Mark Miller
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards
August 5, 2021
Blog
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards

We are starting to make waves in the cybersecurity universe. Turns out, people love us and we are crushing this awards season (like Bong Joon-Ho's Parasite).

  • CAASM
  • GRC
  • SecOps
JupiterOne Team
Policy as Code: How We Do It
August 4, 2021
Blog
Policy as Code: How We Do It

If you only read the first two sentences of this blog, this should be your takeaway: Policy as Code provides a roadmap to verify the processes in security and govern

  • GRC
  • SecOps
Tony Ramirez
Automating Data Classification with JupiterOne
July 28, 2021
Blog
Automating Data Classification with JupiterOne

Anyone reading this article already understands the importance of Data Classification. Increased regulation has been a by-product of greater understanding of the dang

  • CAASM
  • IAM
Akash Ganapathi
JupiterOne Founder Named Top 25 Cyber CEO of 2021
July 28, 2021
Blog
JupiterOne Founder Named Top 25 Cyber CEO of 2021

We just received the awesome news that JupiterOne Founder and Chief Executive Erkang Zheng has been selected as one of The Top 25 Cybersecurity CEOs of 2021 by

JupiterOne Team
Cisco Investments and Splunk Ventures, New Strategic Investors
July 27, 2021
Blog
Cisco Investments and Splunk Ventures, New Strategic Investors

Today, we are proud to announce two additional strategic investors, Cisco Investments and Splunk Ventures, to the JupiterOne journey. This announcement reflects our

Erkang Zheng
Azure Access Review using Optional Traversals in JupiterOne
July 21, 2021
Blog
Azure Access Review using Optional Traversals in JupiterOne

Azure role-based access control (RBAC) allows for expressive access policies through the use of Azure role assignments. Azure role assignments are nodes that link

  • CSPM
Nick Dowmon
A Modern Definition for Cyber Assets
July 14, 2021
Blog
A Modern Definition for Cyber Assets

Cloud adoption, digital transformation, and API-first architecture are fundamentally changing how we build, manage and secure the enterprise. Enterprises use speciali

  • CAASM
Mark Miller
The Next Evolution of ITAM, Beyond CMDB and ITSM
June 23, 2021
Blog
The Next Evolution of ITAM, Beyond CMDB and ITSM

I’m old. When I began my career, IT asset management (ITAM) meant going around, from computer to computer, and putting stickers with barcodes and numbers on every

  • CAASM
Tyler Shields
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.