Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Book Preview: Metrics that Matter - The business context of cyber risk management
December 13, 2021
Blog
Book Preview: Metrics that Matter - The business context of cyber risk management

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from a chapter by Keyaan Williams.

  • CAASM
Keyaan Williams
Book Preview: Reinventing the Cybersecurity Workforce
December 9, 2021
Blog
Book Preview: Reinventing the Cybersecurity Workforce

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

Sushila Nair
JupiterOne Wins Start-up of the Year at BIG Awards for Business
December 7, 2021
Blog
JupiterOne Wins Start-up of the Year at BIG Awards for Business

The Business Intelligence Group’s annual BIG Awards for Business results are in and we are so excited to share that JupiterOne has been recognized as “Start-up of the

JupiterOne Team
Why I Quit Being a JupiterOne Customer...
December 7, 2021
Blog
Why I Quit Being a JupiterOne Customer...

Over the past 19 months, I was empowered to create a security and compliance function at a Seattle startup. I was a pretty successful Security Director by most

Jasmine Henry
Podcast: Talking about CAASM and Community
December 3, 2021
Blog
Podcast: Talking about CAASM and Community

Christian Buckley from the CollabTalk Podcast reached out to me to discuss building communities, given my involvement in supporting massive initiatives within

  • CAASM
Mark Miller
A Nation State Attack Surface: Software Supply Chains
December 1, 2021
Blog
A Nation State Attack Surface: Software Supply Chains

Today’s digital supply chains are a continuously growing and dynamic ecosystem of web-based services, applications, and IT assets. These ecosystems are enabled by an

  • CAASM
  • SecOps
Hema Nair
The Future of Compliance is Continuous
November 24, 2021
Blog
The Future of Compliance is Continuous

The future of compliance is continuous. Since the beginning of technology auditing, auditors have had to rely upon spot-checking to validate whether the entity being

  • CAASM
  • GRC
  • SecOps
Kenneth Kaye
Book Preview: Knowledge without Action is a Wasted Opportunity
November 23, 2021
Blog
Book Preview: Knowledge without Action is a Wasted Opportunity

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

Jennifer Czaplewski
Infographic: The State of Cyber Asset Management
November 18, 2021
Blog
Infographic: The State of Cyber Asset Management

Cyber asset management is now a critical component of an organization’s cybersecurity hygiene and posture management. The more cyber assets in an organization’s

  • CAASM
  • CSPM
  • SecOps
Jennie Duong
Top 5 Reasons Your Attack Surface Is Growing Along with Your Cyber Assets
November 18, 2021
Blog
Top 5 Reasons Your Attack Surface Is Growing Along with Your Cyber Assets

It’s a good time to be a hacker. Evolving IT architectures and workplace models now offer more entry points than ever for an attack, while simultaneously making it

  • CSPM
  • CAASM
  • GRC
  • SecOps
Jennie Duong
J1 ​​Rapid Response: MacOS Zero-day and water-hole attack. Are you vulnerable? How to tell in minutes.
November 17, 2021
Blog
J1 ​​Rapid Response: MacOS Zero-day and water-hole attack. Are you vulnerable? How to tell in minutes.

Zero-day vulnerabilities are the ones that place the most stress on every security team, regardless of the size of the organization. Watering-hole (also known as

  • CAASM
Kenneth Kaye
Cisco and JupiterOne Partnership Goes Beyond Traditional Cloud Security
November 15, 2021
Blog
Cisco and JupiterOne Partnership Goes Beyond Traditional Cloud Security

Fireside chat: Cisco Sr. Director of Product Management for Cloud Security Munawar Hossain, JupiterOne CEO Erkang Zheng and CMO Tyler Shields discuss the new partners

  • CSPM
  • CAASM
Erkang Zheng
Network Segmentation, Visibility and Third-Party Risk Assessment
November 10, 2021
Blog
Network Segmentation, Visibility and Third-Party Risk Assessment

When Colonial Pipeline CEO Joseph Blount testified before the US Congress, he revealed that the attack was completely avoidable; Blount admitted that Darkside gained

  • CAASM
  • SecOps
Steve King
Book Preview: Hardening the Value Stream by Bryan Finster
November 3, 2021
Blog
Book Preview: Hardening the Value Stream by Bryan Finster

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

  • SecOps
Bryan Finster
GitHub Secrets Management with JupiterOne
October 27, 2021
Blog
GitHub Secrets Management with JupiterOne

JupiterOne recently added support for ingesting GitHub Org, Repo, and Environment secrets.

  • CAASM
Erich Smith
Book Preview: Modern Cybersecurity, Preface
October 20, 2021
Blog
Book Preview: Modern Cybersecurity, Preface

On October 19, 2021, we published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". Over the next few weeks, we'll be publishing excerpts from the

  • CSPM
  • CAASM
Erkang Zheng
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future
October 19, 2021
Blog
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future

The speed of change and the tools of adversaries make it extremely hard to envision a long-term, executable vision for the future of security. However, without ponder

  • CAASM
Mark Miller
Our Company Retreat: Camp JupiterOne
October 18, 2021
Blog
Our Company Retreat: Camp JupiterOne

Team retreats are an excellent way to bring a company together. For a remote-first company like JupiterOne, I’d say they are essential. It is a great way to strengthe

Melissa Pereira
Google Cloud Storage Access Analysis
October 14, 2021
Blog
Google Cloud Platform (GCP) Storage Access Analysis

Identity and Access Management (IAM) for Google Cloud uses IAM Role Bindings, which link three constructs together

  • IAM
Michael Knoedel
How To Get Started With IT Security Policies and Procedures
October 13, 2021
Blog
How To Get Started With IT Security Policies and Procedures

You open your email and there it is. Finally, the company that you really wanted to work for has extended you an offer. You feel a rush of adrenaline as you open it

  • GRC
Jeffrey Lee
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup
October 12, 2021
Blog
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup

I’m the Director of Cybersecurity at Esper, a cloud-native startup that offers powerful cloud tooling for Android device deployment and application management at scal

  • GRC
Jasmine Henry
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper
October 5, 2021
Blog
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper

Our customers are at the core of everything we do at JupiterOne. And every security strategy and journey is different for every customer. JupiterOne is starting a mon

JupiterOne Team
Boardroom Conversations on Security: Part 7
October 4, 2021
Blog
Boardroom Conversations on Security: Part 7

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
JupiterOne is a Finalist for NC Tech Cybersecurity Award
September 29, 2021
Blog
JupiterOne is a Finalist for NC Tech Cybersecurity Award

We’re honored to share that JupiterOne has been recognized for its innovation, excellence, and growth as part of the 2021 NC TECH Awards program. JupiterOne is a fin

Melissa Pereira
Boardroom Conversations on Security: Part 6
September 27, 2021
Blog
Boardroom Conversations on Security: Part 6

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected
September 27, 2021
Blog
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected

Last week, we published an article on a recent Chrome zero-day exploit (worth reading if you want see the history of the issue). There was a new announcement this

  • CAASM
Sounil Yu
Future of Cloud Security - Cyber Security Summit Charlotte
September 23, 2021
Blog
Future of Cloud Security - Cyber Security Summit Charlotte

In this panel originally recorded for CyberSecurity Summit 2021 in Charlotte, speakers from JupiterOne, Gigamon, Duo Security, Sonatype, Vectra and Center for

  • CSPM
  • CAASM
Akash Ganapathi
2 Attack Vectors are Forcing Changes in how to Secure Software
September 22, 2021
Blog
2 Attack Vectors are Forcing Changes in how to Secure Software

Cyber criminals have upped their game in the past two years to take advantage of a world distracted in its battles with a global pandemic. Cybercrime is growing conti

Hema Nair
Boardroom Conversations on Security: Part 5
September 20, 2021
Blog
Boardroom Conversations on Security: Part 5

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
J1  Rapid Response: Travis CI Flaw
September 17, 2021
Blog
J1  Rapid Response: Travis CI Flaw

On Monday, September 13, Travis CI put out a security bulletin obliquely mentioning a security problem. “As a reminder from the Support Team, cycling your secrets is

Austin Kelleher
Design Update: Compliance App 2.0
September 15, 2021
Blog
Design Update: Compliance App 2.0

The team at JupiterOne was well underway building version 2.0 of our Compliance App when I joined the company this summer. The primary motivation for the work on 2.0

Patrick Morgan
Boardroom Conversations on Security: Part 4
September 13, 2021
Blog
Boardroom Conversations on Security: Part 4

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
SINET 16 Awards Winner: JupiterOne
September 10, 2021
Blog
SINET 16 Awards Winner: JupiterOne

We are honored to receive this significant industry recognition as the 2021 SINET 16 Innovators Award winner. We know that the market competition is fierce, so we

JupiterOne Team
De Morgan's Law in JupiterOne
September 8, 2021
Blog
De Morgan's Law in JupiterOne

If you recently read about the breaking fix JupiterOne introduced to maintain J1QL language correctness as defined by De Morgan's Law you may have found yourself in

Tony Ramirez
The Absolute Minimum Every Developer Must Know about AWS Security
September 7, 2021
Blog
The Absolute Minimum Every Developer Must Know about AWS Security

The cloud is becoming increasingly popular. It is the driving force of the modern world, and engineers are starting to shift their careers accordingly. Whatever your

  • CAASM
Nishant Thorat
Boardroom Conversations on Security: Part 3
September 6, 2021
Blog
Boardroom Conversations on Security: Part 3

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
CAASM is the Future... CSPM is Dead
September 1, 2021
Blog
CAASM is the Future... CSPM is Dead

Beyond the classic Cloud Security Posture Management (CSPM) tools like Dome9, DivvyCloud, etc. now even infrastructure and workload scanners claim CSPM as part of the

  • CAASM
  • CSPM
Akash Ganapathi
Boardroom Conversations on Security: Part 2
August 30, 2021
Blog
Boardroom Conversations on Security: Part 2

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards
August 26, 2021
Blog
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards

We are excited to announce that JupiterOne has been selected as a Winner in the WorldFestival 2021 Innovation Awards in the Cloud Computing category! We are extremely

JupiterOne Team
My Bucket, My Data! (or is it?)
August 24, 2021
Blog
My Bucket, My Data! (or is it?)

AWS S3 has long become a standard for storing file object data. Despite the many efforts in making S3 secure, we continue to see data in private buckets exposed or ex

  • CAASM
Erkang Zheng
Boardroom Conversations on Security: Part 1
August 23, 2021
Blog
Boardroom Conversations on Security: Part 1

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
Compliance is cumbersome, but cloud can help
August 18, 2021
Blog
Compliance is cumbersome, but cloud can help

Guest author Chris Hughes, CISO and Co-Founder of Aquia, offers a view of the "Shared Responsibility Model".

  • CSPM
Chris Hughes
JupiterOne Launches Query Anywhere
August 11, 2021
Blog
JupiterOne Launches Query Anywhere

This week JupiterOne launched Query Anywhere. As you might guess, this feature will allow J1 users to access the core 'search for anything' functionality of J1QL no

Chum Wongrassamee
Podcast: CYA - Cover Your Assets with Chris Roberts
August 9, 2021
Blog
Podcast: CYA - Cover Your Assets with Chris Roberts

A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talking about. Everyday

  • CAASM
  • SecOps
Mark Miller
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards
August 5, 2021
Blog
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards

We are starting to make waves in the cybersecurity universe. Turns out, people love us and we are crushing this awards season (like Bong Joon-Ho's Parasite).

  • CAASM
  • GRC
  • SecOps
JupiterOne Team
Policy as Code: How We Do It
August 4, 2021
Blog
Policy as Code: How We Do It

If you only read the first two sentences of this blog, this should be your takeaway: Policy as Code provides a roadmap to verify the processes in security and govern

  • GRC
  • SecOps
Tony Ramirez
JupiterOne Founder Named Top 25 Cyber CEO of 2021
July 28, 2021
Blog
JupiterOne Founder Named Top 25 Cyber CEO of 2021

We just received the awesome news that JupiterOne Founder and Chief Executive Erkang Zheng has been selected as one of The Top 25 Cybersecurity CEOs of 2021 by

JupiterOne Team
Automating Data Classification with JupiterOne
July 28, 2021
Blog
Automating Data Classification with JupiterOne

Anyone reading this article already understands the importance of Data Classification. Increased regulation has been a by-product of greater understanding of the dang

  • CAASM
  • IAM
Akash Ganapathi
Cisco Investments and Splunk Ventures, New Strategic Investors
July 27, 2021
Blog
Cisco Investments and Splunk Ventures, New Strategic Investors

Today, we are proud to announce two additional strategic investors, Cisco Investments and Splunk Ventures, to the JupiterOne journey. This announcement reflects our

Erkang Zheng
Azure Access Review using Optional Traversals in JupiterOne
July 21, 2021
Blog
Azure Access Review using Optional Traversals in JupiterOne

Azure role-based access control (RBAC) allows for expressive access policies through the use of Azure role assignments. Azure role assignments are nodes that link

  • CSPM
Nick Dowmon
A Modern Definition for Cyber Assets
July 14, 2021
Blog
A Modern Definition for Cyber Assets

Cloud adoption, digital transformation, and API-first architecture are fundamentally changing how we build, manage and secure the enterprise. Enterprises use speciali

  • CAASM
Mark Miller
The Next Evolution of ITAM, Beyond CMDB and ITSM
June 23, 2021
Blog
The Next Evolution of ITAM, Beyond CMDB and ITSM

I’m old. When I began my career, IT asset management (ITAM) meant going around, from computer to computer, and putting stickers with barcodes and numbers on every

  • CAASM
Tyler Shields
Podcast:  OWASP Flagship Projects - Episode 02
June 16, 2021
Blog
Podcast:  OWASP Flagship Projects - Episode 02

Today’s episode begins with Seba Deleersnyder, project lead for the Software Assurance Maturity Model, or SAMM. The mission of this OWASP Flagship Project is to

  • CAASM
  • SecOps
Mark Miller
Solving for Endpoint Compliance in a Cloud-First Landscape | JupiterOne | Simplified Security Operations
June 14, 2021
Blog
Solving for Endpoint Compliance in a Cloud-First Landscape

Before I became a Security Engineer at JupiterOne, I was the sole security automation and cloud compliance engineer at LifeOmic. We built the JupiterOne platform to

Erich Smith
The Future of Cloud Security - Cybersecurity Summit Silicon Valley
June 9, 2021
Blog
The Future of Cloud Security - Cybersecurity Summit Silicon Valley

In this panel originally recorded for CyberSecurity Summit 2021 in Silicon Valley, speakers from JupiterOne, axiad, Duo Security, Gigamon, Recorded Future, and

  • CAASM
Tyler Shields
JupiterOne Cares: Serving our Local Communities
June 9, 2021
Blog
JupiterOne Cares: Serving our Local Communities

"What did you do this weekend"? It's a typical question that gets asked a million times a day, around the world, every Monday. We posed the question to our team a

JupiterOne Team
Podcast:  OWASP Flagship Projects - Episode 01
June 4, 2021
Blog
Podcast:  OWASP Flagship Projects - Episode 01

This is part of an ongoing podcast series, highlighting the OWASP Flagship Projects that will be featured at the OWASP 20th Anniversary Celebration in September.

  • CAASM
  • SecOps
Mark Miller
5 Factors to Building a Better Security Engineering Culture and Team
June 2, 2021
Blog
5 Factors to Building a Better Security Engineering Culture and Team

"Security engineering is the process of incorporating security controls into the information system so that they become an integral part of the system's operational

  • CAASM
  • SecOps
Sounil Yu
IAM, CSPM, VM, IR, Compliance... Oh My!
May 26, 2021
Blog
IAM, CSPM, VM, IR, Compliance... Oh My!

In security, when you think of the term 'asset', where does your head go? Chances are, you're thinking of employee laptops and bare-metal servers on-premise or in

  • CAASM
  • IAM
  • CSPM
George Tang
How to Measure the Cost of Risk
May 19, 2021
Blog
How to Measure the Cost of Risk

Caroline Wong and I recently had a call to discuss something that’s been bothering me for years… how do we assess financial risk before a data breach happens. How do

  • CAASM
  • SecOps
Mark Miller
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.