Mission Control Blog

Whether you are gathering evidences for SOC 2 Type II or just doing some vulnerability analysis and reporting, data reliability is critical. Your confidence in your
- CAASM
- SecOps

Last week, LifeOmic CISO and JupiterOne Founder Erkang Zheng spoke with Reddit CISO Sean Catlett at RSA Confererce 2020.
- CAASM

One of the newer features of JupiterOne is the ability to download all evidence for a compliance standard. This feature collects the compliance requirements, question
- GRC

Cloud-based organizations are increasingly leveraging open-sourced tools to help in their security and compliance monitoring. Whether it's trying to keep a handle on
- SecOps

As we look forward to the last week of 2019, with 2020 patiently waiting for us, we wanted to dive into some of the data highlighting how JupiterOne is helping dozens

Which approach to managing security operations has a greater impact on security posture?
- CSPM
- SecOps

Security budgets are growing and that trend is expected to continue in the coming year. However, that growth is built more on security fears, privacy concerns and
- CAASM
- GRC

When you know exactly what you are looking for, it should be easier – not harder – to get to the data. But security teams know this is rarely the case. Think about
- CAASM
- SecOps

As we have noted in a previous blog post, leading SaaS and cloud-based organizations seeking to move upstream in customer acquisition or looking to improve their
- GRC

We recently launched a new feature shortening the amount of time it takes for your team to get to the data they need to take necessary actions. Here is an overview of

JupiterOne CEO Erkang Zheng attended last weeks DevSecCon in Seattle, highlighting what it takes for security teams to keep up with the speed of DevOps.
- SecOps

It's been a little over a week since the coverage of the Capital One data breach. The impact of 100 million plus records that were compromised breathed gasoline onto
- CSPM
- CAASM

Introducing the latest functionality within JupiterOne's Asset Inventory features.
- CAASM
- SecOps

SaaS and cloud-providers operating in the healthcare space have to tackle HIPAA compliance. Once you've done that, a common question we hear is "how do I stack up
- GRC

In order to build a sound and secure SaaS product, organizations have to create a thorough and scalable security program. This program will ensure your team has a
- SecOps

When only a few spare minutes can be spent on proactive security operations, what should you do?
- SecOps

Most organizations take a linear, list-based approach to security operations. It's a two-dimensional process. First, identify resources. Second, manage their
- GRC
- SecOps

That's right. It wasn't a typo. After enabling AWS Config across five of our AWS accounts, we decided to remove all but two of our Config rules. But why?
- CSPM
- CAASM

Security Assurance never looked so good. Security analysts and teams face a tall task when it comes to deploying new resources, team members and devices at scale
- CSPM
- CAASM
- GRC

The deals are slower, more complex and full of legalize and redlines, but many SaaS providers look upstream as an opportunity to unlock their true potential.

Watch LifeOmic CISO and JupiterOne General Manager Erkang Zheng walk through how to leverage a graph-based database and search functionality to simplify security
- CAASM
- SecOps

Awareness training, after an incident, is about as valuable as an oven mitt after burning your hand taking something out of the oven. It's important to proactively

We are excited to announce JupiterOne's latest integrations with G Suite and Veracode in an ongoing effort to centralize and simplify security operations, helping

We are inundated with stories around security vulnerabilities and breaches all of the time. So how to we wade through the alerts and take action remediating security
- SecOps

BSidesSLC 2019 | JupiterOne | Simplified Security Operations

Unlimited and instant scalability. Pay per use. Globally distributed infrastructure. These are just some of the reasons organizations have turned to the cloud.
- CSPM
- CAASM
- SecOps

Cyber security represents all of the below efforts and lengths an organization will go to to prevent themselves from cyber attacks. This onion is a good
- CAASM
- GRC
- SecOps

Understanding adoption and popularity of different security frameworks for Healthcare Organizations and how we expect that to change in 2019
- GRC

I am going to skip the small talk about the security landscape, how much it all sucks and how we are all doomed and get straight to the point.
- CAASM
- SecOps

In security operations, time is the ultimate currency. Your path to security assurance is dependent on time. Producing compliance evidence, identifying
- SecOps

The end of December can be a tremendously productive time of year for teams. With customers and coworkers beginning to take time off, the demands on time begin to
- CAASM
- SecOps

The NIST cybersecurity framework is a risk-based, rather than compliance drive, cybersecurity document. This approach means organizations focus on real risks and
- CAASM
- SecOps

Effective plans start with a goal. For security and operations, compliance isn't that goal.
- CSPM
- CAASM
- GRC

When you think about cloud security, it's easy to see the similarities between managing one's digital infrastructure and flying a plane. Inside of a cockpit there are
- CAASM

Here we go again. Just last week there have been more major data breaches and hacks. Those organizations include Marriott, the nation's largest hotel chain, Amazon,
- CSPM
- CAASM
- SecOps

HITRUST is both a risk- and compliance-based, certifiable, cybersecurity framework that provides organizations with a comprehensive, flexible and efficient approach
- GRC

I recently attended the Gartner Symposium ITXpo in Orlando, with nearly 10,000 other CIOs and IT leaders. It was an exciting week with conversations concentrated
- CAASM
- GRC
- SecOps

Let's be honest. This is a mess. We are losing in the battle of cybersecurity. There is no stopping the attacks.
- SecOps

Let me start by sharing the foundational and most important aspect of our view of cybersecurity operations and the genesis of why we created JupiterOne. Prior to
- SecOps

For years, I’ve been hearing security people say that about uninformed users who fall victims to cyberattacks. I gotta admit, I was guilty too of saying that on a few

Just a short decade ago, cybersecurity was still a fringe subject to most people. Today, while still fascinating, it has undoubtedly become part of our daily life.
- CSPM
- CAASM
- GRC
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.