Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Buying a DSPM solution
May 30, 2023
Blog
Shopping for DSPM tools - What to know and where JupiterOne fits in

When are Data Security Posture Management tools useful and how can JupiterOne be used for basic DSPM functions?

Guillaume Ross
2022 and 2023 State of Cyber Assets Reports
May 19, 2023
Blog
2023 SCAR expands on context and depth of analysis over inaugural report

The 2023 SCAR report builds in some important contextual analysis of the findings, including company size breakdowns and CSP adoption details.

Corey Tomlinson
Why IT teams should use JupiterOne
May 16, 2023
Blog
Why IT teams should be using JupiterOne, Part 3

JupiterOne can assist many functions within your IT department, including one very visible and important team: Help Desk Support.

Josh Mattox
12 cyber resilience questions
May 12, 2023
Blog
12 cyber resilience questions for the C-Suite and Board

Cyber resilience starts with knowing which questions the organization should answer, across all levels, from the front lines to the Board of Directors.

Erkang Zheng
Power of problem solving
May 9, 2023
Blog
The Power of Problem Solving

Problem solving is at the core of what we do, from building a better product to helping our customers solve the most challenging cybersecurity and business problems.

Jim Grundner
RSAC 2023 Recap
May 4, 2023
Blog
Zero Trust to Zero Days, nascent AI, and other things we learned at RSAC 2023

RSA Conference 2023 has come and gone. There's quite a bit to come away with from the event - here are some of the things we learned here at JupiterOne.

Kevin Miller
2023 State of Cyber Assets Report
May 2, 2023
Blog
Harnessing the State of Cyber Assets Report to make positive security changes in your organization

Take a look at some of the key facts and considerations from the 2023 State of Cyber Assets Report.

Tanvi Tapadia
RSA Conference Top 5 Booths
May 1, 2023
Blog
Top 5 most creative booths we admired at RSA Conference

The JupiterOne team spent some time checking out the most creative booths on the 2023 RSA Conference floor and came back with a top-5 list of their favorites.

Rebecca Sanda
Attack surface growth exceeds security teams
April 26, 2023
Blog
Attack surface growth exceeds security team expansion at unmanageable pace

The growing gap between team growth and attack surface, evident in the 2023 State of Cyber Assets Report (SCAR), drives teams to secure resources at scale.

Ashleigh Lee
April 24, 2023
Blog
New J1 AI offering helps power Unified Cyber Insights and drive security efficiency

JupiterOne AI is an artificial intelligence-powered, self-service experience harnessing the power and usability of AI/ML.

Kevin Miller
Alex Dyer - Secureworks
April 17, 2023
Blog
How Secureworks observes unobservable assets across AWS Organizations

Secureworks' Alex Dyer demonstrates how his company uses JupiterOne to monitor and manage AWS Organizations across an enterprise environment.

  • CAASM
Alex Dyer
Microsoft Azure vulnerable permissions
April 14, 2023
Blog
New toxic combination of default and common configurations in Azure: How to investigate in JupiterOne

JupiterOne can help organizations understand the impact of a recently discovered issue in Microsoft Azure that could lead to unauthorized access and possible attacks.

  • Vuln Mgmt
Akash Ganapathi
State of Cyber Assets Report
April 12, 2023
Blog
Second annual State of Cyber Assets Report reveals growth in cyber asset value and scale

The annual State of Cyber Assets Report (SCAR) analyzes data from organizations using JupiterOne to better understand today’s cybersecurity landscape.

Corey Tomlinson
JupiterOne at the center of Cybersecurity Mesh Architecture
April 7, 2023
Blog
Understanding and accelerating Cybersecurity Mesh Architecture

Enterprises seeking to employ Cybersecurity Mesh Architecture can turn to JupiterOne as an invaluable CSMA accelerator and enabler.

Sean Catlett
Does security awareness training work?
April 6, 2023
Blog
Security leaders debate: Does security awareness training work?

Does cybersecurity awareness training work? Security leaders Sounil Yu and Juliet Okafor debate the question.

Corey Tomlinson
Cyber Defense Matrix Conference
March 28, 2023
Blog
How (and why) to visualize breaches with The Cyber Defense Matrix

Adrian Sanabria, a practitioner with more than 20 years of experience, shared his use case for The Cyber Defense Matrix - visualizing breaches and incidents.

  • IR
Sarah Hartland
March 23, 2023
Blog
Why IT teams should be using JupiterOne, Part 2

Continuing with lessons learned from Part 1 and the recent Automox deployment at JupiterOne, we look at how to use JupiterOne to simplify endpoint software deployment

Josh Mattox
JupiterOne CRO Paul Forte
March 22, 2023
Blog
Introducing our new Chief Revenue Officer - Paul Forte

Technology sales and customer success veteran Paul Forte joins JupiterOne as its new Chief Revenue Officer.

JupiterOne Team
The Cybersecurity Defense Matrix
March 20, 2023
Blog
Map your cybersecurity gaps with the Cyber Defense Matrix

The Cyber Defense Matrix provides a framework to organize your security data and identify your cybersecurity gaps.

Tanvi Tapadia
March 7, 2023
Blog
Greater visibility and faster incident response with Tines and JupiterOne

Streamline operations with the new Tines’ workflow automation integration in JupiterOne

Jenn Cardamone
March 2, 2023
Blog
How to discover, map, and triage open source dependency vulnerabilities

With the rise of open source software comes the rise of vulnerabilities in code dependencies. To find and fix these issues, there are three key questions to answer.

Cameron Griffin
February 21, 2023
Blog
What to do if you spot an unauthorized member in your Google Groups

We recently had a situation at JupiterOne which triggered curiosity in members of our security team. A Google Group, used as a distribution list, had a surprise membe

Guillaume Ross
February 6, 2023
Blog
What’s new in JupiterOne: Reducing time to value with the new Query Builder (Part 2)

The new JupiterOne Query Builder streamlines your querying experience by eliminating errors, simplifying query builds, and reducing time to value.

Tanvi Tapadia
February 2, 2023
Blog
The top 10 questions that every engineering leader should be able to answer

We polled some of our engineering leaders to see what it takes to succeed. In part two, we see if their answers align with the CISOs we talked to.

Kevin Miller
Identify compromised versions of Github using JupiterOne
January 31, 2023
Blog
Identify compromised versions of GitHub apps using JupiterOne

As a preventative measure, Github will be deprecating the Mac and Windows signing certificates used to sign Desktop app versions 3.0.2-3.1.2 and Atom versions 1.63.0-

JupiterOne Team
January 30, 2023
Blog
The top 11 questions that every CISO should be able to answer

In part one of this two-part series, we polled some of our top security experts to see what it takes to succeed secure and manage resources effectively.

Kevin Miller
Cyber Therapy - Let's Unpack That
January 25, 2023
Blog
Best of Cyber Therapy, Season 1

Take a look at the top 5 episodes from Season 1 of Cyber Therapy, a video podcast featuring the humans of cybersecurity!

Ashleigh Lee
JupiterOne 2022 product recap
January 25, 2023
Blog
Recapping the top new JupiterOne product developments from 2022

Review of some of the notable new features and updates to JupiterOne from 2022.

Corey Tomlinson
Forrester’s Total Economic Impact Study: JupiterOne Yields 332% ROI
January 23, 2023
Blog
Forrester’s Total Economic Impact study: JupiterOne yields 332% ROI

Switching to a new technology solution can be a gamble. With the right information to make your decision, you can be guided to base your purchase on a validated econo

Melissa Pereira
January 20, 2023
Blog
What's new in JupiterOne: powerful, intuitive queries (Part 1)

We’ve revamped the JupiterOne Homepage and Questions Library so you can spend less time asking questions and more time getting to the bottom of any issue.

Tanvi Tapadia
January 17, 2023
Blog
16 free or open source security and incident response tools to try in 2023

Learn about the open source cybersecurity tools available to your organization, and why you should use them.

Sarah Hartland
January 11, 2023
Blog
Connect your cybersecurity dots with a graph database

Traditional, relational databases are not equipped to meet the demands of a complex, cloud-native, hybrid, or multi-cloud environment. Luckily, graph databases can.

Tanvi Tapadia
Cybersecurity predictions for 2023
January 4, 2023
Blog
Security prediction for 2023: Security teams will use engineering tools

Kelly Shortridge, Fastly Senior Principal, Product Technology, offered her security predictions for 2023 as part of a CSA panel discussion webinar to close out 2022.

Corey Tomlinson
December 30, 2022
Blog
Creating an effective enterprise vulnerability management strategy

A lot of things go into creating an enterprise vulnerability management strategy. Learn how to build a strategy that will meet the unique needs of your organization.

  • Vuln Mgmt
Corey Tomlinson
December 30, 2022
Blog
The LastPass Breach: Using JupiterOne to prioritize which users you need to focus on

If you are a LastPass customer, the only thing standing between an attacker and your decrypted vault is a weak password. Find those easily with JupiterOne.

Sounil Yu
Vulnerability management workflow
December 20, 2022
Blog
Employ a vulnerability management workflow to better secure your organization

Incorporating a vulnerability management workflow will make your vulnerability management efforts and tools more effective and reliable.

  • Vuln Mgmt
Corey Tomlinson
December 15, 2022
Blog
Achieving continuous compliance with a cyber asset attack surface management platform

How long does it take you to find out you've become noncompliant? Continuous compliance solutions go beyond point-in-time checks to ensure compliance at all times.

  • Compliance
Tanvi Tapadia
December 15, 2022
Blog
25 Cybersecurity conferences you should attend in 2023

25 cybersecurity conferences we recommend (and will also attend!).

Valerie Zargarpur
December 13, 2022
Blog
JupiterOne & Project Discovery: Automating Nuclei with JupiterOne

We are releasing j1nuclei, an open-source tool to automate vulnerability scanning. The tool is available to anyone using the free version of JupiterOne.

J1 Labs
5 features of vulnerability management tools
December 12, 2022
Blog
Five features to consider when evaluating vulnerability management tools

Vulnerability management tools are an important part of enterprise cybersecurity. Choosing the right tool will make a huge difference in your cybersecurity program.

  • Vuln Mgmt
Corey Tomlinson
December 8, 2022
Blog
What is Attack Surface Analysis?

Attack surface analysis is the process of identifying and mapping the areas in your attack surface that need to be reviewed for gaps and vulnerabilities by way of con

Tanvi Tapadia
November 30, 2022
Blog
JupiterOne and AWS together help customers strengthen security posture

To help organizations of all sizes secure their cloud assets, JupiterOne announced a number of key initiatives with AWS this week at re:Invent.

  • CSPM
  • CAASM
Bryan Embrey
November 23, 2022
Blog
How to visualize your data by use case with JupiterOne

The new Properties Panel and Managed Dashboards in the JupiterOne platform empower you to prioritize speed, efficiency, and organization!

Tanvi Tapadia
November 23, 2022
Blog
Security will give up on users as a line of defense in 2023

In a recent debate on cybersecurity predictions for 2023, panelists disagreed on plenty. But they agreed: in 2023, security will give up on users as a line of defense

Sarah Hartland
November 21, 2022
Blog
Why JupiterOne security redefined the vendor security risk assessment process

Our redefined process has made JupiterOne security’s vendor assessments significantly more enjoyable, effective, and streamlined. I hope our lessons learned help you

Jasmine Henry
What is a vulnerability management system?
November 17, 2022
Blog
Four key pillars of a successful vulnerability management system

Vulnerability management systems play a crucial role in organizations' defenses by identifying and evaluating vulnerabilities for cybersecurity teams to act on.

  • Vuln Mgmt
Corey Tomlinson
Crystal ball, CSPM+
November 15, 2022
Blog
2023 prediction: cloud security will move beyond CSPM

What's next for cloud security? Four security leaders shared their predictions for what we'll see in 2023 - and we don't think he's far off.

  • CSPM
Tanvi Tapadia
November 10, 2022
Blog
ISO/IEC 27001:2022: 11 new controls on a shoestring budget

What if ‘shoestring budget’ were a state of mind as opposed to a fiscal reality for some of us? I still think many of the best compliance solutions are available at s

Jasmine Henry
November 9, 2022
Blog
How to improve attack surface visibility with JupiterOne

Attack surface visibility is the key to a secure cloud native platform. Visit JupiterOne to see how our platform makes it easy to monitor your entire landscape.

Tanvi Tapadia
November 8, 2022
Blog
12 predictions you may have missed from the 2023 security predictions panel

Recently, we sat down with four security leaders to hear their top security predictions for 2023. Here are 12 more predictions that didn’t make the cut in the origina

Sarah Hartland
November 3, 2022
Blog
Attack surface and attack paths research - what's next?

The JupiterOne research team has been analyzing data from 2,285 organizations to better understand the attack surface and attack paths. This article discusses what th

Sarah Hartland
Why I joined JupiterOne
November 2, 2022
Blog
Why I joined JupiterOne

It’s not often you get to make big changes in your career, but I’ve been lucky enough to do so recently with a move to London and a shift in the role from being a CIS

Sean Catlett
a dictionary is open to the term "cyber attack surface" against a dark blue background
November 1, 2022
Blog
Understanding the cyber attack surface

Cybersecurity professionals use the term ‘attack surface’ to describe the totality of all potential entry points into their environment, and may refer to a particular

  • CAASM
Sarah Hartland
How to Choose CAASM Vendors
October 26, 2022
Blog
What to look for in your perfect CAASM vendor

By now, it’s likely that you’ve heard the term “attack surface,” which is the summation of all the possible risk exposures, vulnerabilities, and controls across your

  • CAASM
Tanvi Tapadia
Preliminary research on attack surface reveals use cases for list vs. graph-based analysis
October 26, 2022
Blog
Preliminary research on attack surface reveals use cases for list vs. graph-based analysis

In “A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface,” JupiterOne researchers expand upon the 2022 State of Cyber Assets Report analysis to be

Sarah Hartland
What is SOC 2 for Cloud-native Platforms?
October 19, 2022
Blog
7 steps to achieving SOC 2 compliance for cloud-native platforms

In 2021, SOC 2 took the crown for most popular audit for cybersecurity, IT, quality assurance, internal audit, finance, and other industries. SOC 2 is a voluntary com

Tanvi Tapadia
How one compliance-as-a-service provider uses JupiterOne
October 18, 2022
Blog
How one compliance-as-a-service provider uses JupiterOne

For most people, compliance is stressful. Tracking down relevant paperwork, heavy workloads, deadlines that always seem too close, and the issue of “passing” an audit

Tanvi Tapadia
CAASM Is Officially a Must In Your Tech Stack — And Don't Just Take it From Us
October 13, 2022
Blog
CAASM is officially a must in your tech stack — and don't just take it from us

The CISO’s role is not for the faint-hearted. In their hands and the hands of their team lies a massive responsibility – keeping the organization safe from security

  • CAASM
Tanvi Tapadia
Reduce Hours Spent on Cyber Asset Identification by 85%
October 12, 2022
Blog
Reduce hours spent on cyber asset identification by 85%

The average security team is responsible for 165,633 cyber assets and is likely to have additional ghost assets lurking in their environments. Cyber asset identificat

  • CAASM
Sarah Hartland
Cyber Asset Management: What It Is and Why It Matters
October 11, 2022
Blog
Why basic security hygiene should include cyber asset management

People always tell you to get your head out of the clouds. In the case of today’s rapid migration towards cloud-based, software-defined, and everything-as-a-service

  • CAASM
  • GRC
Tanvi Tapadia
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.