Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Jasmine Henry
Jasmine Henry

Jasmine Henry is a security practitioner who's used JupiterOne to create a compliant security function at a cloud-native startup. She has 10 years of experience leading security programs, an MS in Informatics and Analytics, and a commitment to mentoring rising security practitioners from underrepresented backgrounds. Jasmine is a Career Village co-organizer for The Diana Initiative security conference. She lives in the Capitol Hill neighborhood of Seattle, WA.

November 21, 2022
Blog
Why JupiterOne security redefined the vendor security risk assessment process

Our redefined process has made JupiterOne security’s vendor assessments significantly more enjoyable, effective, and streamlined. I hope our lessons learned help you

Jasmine Henry
November 10, 2022
Blog
ISO/IEC 27001:2022: 11 new controls on a shoestring budget

What if ‘shoestring budget’ were a state of mind as opposed to a fiscal reality for some of us? I still think many of the best compliance solutions are available at s

Jasmine Henry
Blind Spots Turn Cybersecurity into a Big Data Search Problem
May 10, 2022
Blog
Blind Spots Turn Cybersecurity into a Big Data Search Problem

Orphaned assets are a familiar story for every cybersecurity professional. Like something out of a horror movie, these legacy devices lurk neglected, forgotten, and

  • CAASM
Jasmine Henry
Third-party Code and Supply Chain Security Increase Complexity and Risk
May 6, 2022
Blog
Third-party Code and Supply Chain Security Increase Complexity and Risk

To paraphrase the tagline of Capital One’s credit card ads: What’s in your enterprise code? For many companies, the answer to that question has brought considerable

  • CAASM
Jasmine Henry
JupiterOne Press Book Release: Reinventing Cybersecurity
May 3, 2022
Blog
JupiterOne Press Book Release: Reinventing Cybersecurity

Reinvention is certainly not a new idea, especially for cybersecurity practitioners who are continuously challenged to adapt to new threats, an expanding attack

Jasmine Henry
Ultra-reliable, Dynamic Network Architecture Demands Automated Security
April 26, 2022
Blog
Ultra-reliable, Dynamic Network Architecture Demands Automated Security

In the modern world, speed is everything. Customers demand constant innovation, while sudden market disruption makes agility essential for survival. To remain

  • CAASM
Jasmine Henry
Growing Security Skills Gap Calls for a New Approach to Training
April 5, 2022
Blog
Growing Security Skills Gap Calls for a New Approach to Training

As the scope of the cyber hygiene challenge outpaces the expert resources available, security teams are losing ground in the effort to protect their organization

  • CAASM
Jasmine Henry
Expanding Attack Surface and Cybersecurity Alert Fatigue Hinder Cyber Hygiene Basics
March 29, 2022
Blog
Expanding Attack Surface and Cybersecurity Alert Fatigue Hinder Cyber Hygiene Basics

Cybersecurity alert fatigue is an issue that is long overdue for a real solution. The average cybersecurity team is facing a backlog of 120,561 findings and alerts

  • CSPM
  • CAASM
  • SecOps
Jasmine Henry
Why Security Practitioners Often Misjudge Risk to Cyber Assets
March 17, 2022
Blog
Why Security Practitioners Often Misjudge Risk to Cyber Assets

Digital transformation has created remarkable and irreversible growth in the cyber asset landscape. Each business shift towards digital workflows has yielded a steady

  • CAASM
Jasmine Henry
25 On-Point Cybersecurity Conferences in 2022
January 12, 2022
Blog
25 On-Point Cybersecurity Conferences in 2022

Most security practitioners admit they spend their free time upskilling. Learning can occur in settings ranging from the practitioner’s home labs to security

Jasmine Henry
The Debate: Should You Build or Buy CAASM?
December 21, 2021
Blog
The Debate: Should You Build or Buy CAASM?

Should you build or buy a CAASM solution? It’s a valid question, especially in an ecosystem rich with open source and low-cost security tools. You don’t need

  • CAASM
Jasmine Henry
CAASM Should Be an Early Security Investment in Every CISO's Playbook
December 15, 2021
Blog
CAASM Should Be an Early Security Investment in Every CISO's Playbook

It’s possible to improve your security posture on a shoestring budget. There are a growing number of open source tools for security and compliance, but there are also

  • CAASM
Jasmine Henry
Why I Quit Being a JupiterOne Customer...
December 7, 2021
Blog
Why I Quit Being a JupiterOne Customer...

Over the past 19 months, I was empowered to create a security and compliance function at a Seattle startup. I was a pretty successful Security Director by most

Jasmine Henry
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup
October 12, 2021
Blog
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup

I’m the Director of Cybersecurity at Esper, a cloud-native startup that offers powerful cloud tooling for Android device deployment and application management at scal

  • GRC
Jasmine Henry
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.