Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
November 21, 2022
Blog
Why JupiterOne security redefined the vendor security risk assessment process

Our redefined process has made JupiterOne security’s vendor assessments significantly more enjoyable, effective, and streamlined. I hope our lessons learned help you

Jasmine Henry
What is a vulnerability management system?
November 17, 2022
Blog
Four key pillars of a successful vulnerability management system

Vulnerability management systems play a crucial role in organizations' defenses by identifying and evaluating vulnerabilities for cybersecurity teams to act on.

  • Vuln Mgmt
Corey Tomlinson
Crystal ball, CSPM+
November 15, 2022
Blog
2023 prediction: cloud security will move beyond CSPM

What's next for cloud security? Four security leaders shared their predictions for what we'll see in 2023 - and we don't think he's far off.

  • CSPM
Tanvi Tapadia
November 10, 2022
Blog
ISO/IEC 27001:2022: 11 new controls on a shoestring budget

What if ‘shoestring budget’ were a state of mind as opposed to a fiscal reality for some of us? I still think many of the best compliance solutions are available at s

Jasmine Henry
November 9, 2022
Blog
How to improve attack surface visibility with JupiterOne

Attack surface visibility is the key to a secure cloud native platform. Visit JupiterOne to see how our platform makes it easy to monitor your entire landscape.

Tanvi Tapadia
November 8, 2022
Blog
12 predictions you may have missed from the 2023 security predictions panel

Recently, we sat down with four security leaders to hear their top security predictions for 2023. Here are 12 more predictions that didn’t make the cut in the origina

Sarah Hartland
November 3, 2022
Blog
Attack surface and attack paths research - what's next?

The JupiterOne research team has been analyzing data from 2,285 organizations to better understand the attack surface and attack paths. This article discusses what th

Sarah Hartland
Why I joined JupiterOne
November 2, 2022
Blog
Why I joined JupiterOne

It’s not often you get to make big changes in your career, but I’ve been lucky enough to do so recently with a move to London and a shift in the role from being a CIS

Sean Catlett
a dictionary is open to the term "cyber attack surface" against a dark blue background
November 1, 2022
Blog
Understanding the cyber attack surface

Cybersecurity professionals use the term ‘attack surface’ to describe the totality of all potential entry points into their environment, and may refer to a particular

  • CAASM
Sarah Hartland
How to Choose CAASM Vendors
October 26, 2022
Blog
What to look for in your perfect CAASM vendor

By now, it’s likely that you’ve heard the term “attack surface,” which is the summation of all the possible risk exposures, vulnerabilities, and controls across your

  • CAASM
Tanvi Tapadia
Preliminary research on attack surface reveals use cases for list vs. graph-based analysis
October 26, 2022
Blog
Preliminary research on attack surface reveals use cases for list vs. graph-based analysis

In “A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface,” JupiterOne researchers expand upon the 2022 State of Cyber Assets Report analysis to be

Sarah Hartland
What is SOC 2 for Cloud-native Platforms?
October 19, 2022
Blog
7 steps to achieving SOC 2 compliance for cloud-native platforms

In 2021, SOC 2 took the crown for most popular audit for cybersecurity, IT, quality assurance, internal audit, finance, and other industries. SOC 2 is a voluntary com

Tanvi Tapadia
How one compliance-as-a-service provider uses JupiterOne
October 18, 2022
Blog
How one compliance-as-a-service provider uses JupiterOne

For most people, compliance is stressful. Tracking down relevant paperwork, heavy workloads, deadlines that always seem too close, and the issue of “passing” an audit

Tanvi Tapadia
CAASM Is Officially a Must In Your Tech Stack — And Don't Just Take it From Us
October 13, 2022
Blog
CAASM is officially a must in your tech stack — and don't just take it from us

The CISO’s role is not for the faint-hearted. In their hands and the hands of their team lies a massive responsibility – keeping the organization safe from security

  • CAASM
Tanvi Tapadia
Reduce Hours Spent on Cyber Asset Identification by 85%
October 12, 2022
Blog
Reduce hours spent on cyber asset identification by 85%

The average security team is responsible for 165,633 cyber assets and is likely to have additional ghost assets lurking in their environments. Cyber asset identificat

  • CAASM
Sarah Hartland
Cyber Asset Management: What It Is and Why It Matters
October 11, 2022
Blog
Why basic security hygiene should include cyber asset management

People always tell you to get your head out of the clouds. In the case of today’s rapid migration towards cloud-based, software-defined, and everything-as-a-service

  • CAASM
  • GRC
Tanvi Tapadia
How to Identify Critical Assets in Cybersecurity To Alleviate Alert Fatigue
October 7, 2022
Blog
How to identify critical assets in cybersecurity to alleviate alert fatigue

The need for comprehensive cybersecurity is the greatest it's ever been, with no signs of slowing down. We have a backlog problem. Security practitioners everywhere

Tanvi Tapadia
Introducing JupiterOne Stellar Partner Program
October 6, 2022
Blog
Introducing JupiterOne Stellar Partner Program

We’ve reached a new milestone! Today, we’re excited to announce the official launch of JupiterOne’s Stellar Partner Program. Our company is founded on partnerships,

Ale Espinosa
What to do After a Data Breach
October 5, 2022
Blog
What to do after a data breach

There's likely two reasons you've come across this blog: one, you've recently experienced a data breach or two, you want to prepare yourself in the event of a data br

Tanvi Tapadia
Top 5 Things to Know This Cybersecurity Awareness Month
October 5, 2022
Blog
Top 5 things to know this Cybersecurity Awareness Month

It's October, which means that, in addition to ghosts and goblins, it's also National Cybersecurity Awareness Month! The Department of Homeland Security and the Natio

Melissa Pereira
What are ghost assets and are they costing your org?
October 4, 2022
Blog
What are ghost assets and are they costing your org?

Ghosts, zombies, and shadows are not just the stuff of spooky movies and Halloween haunts. These descriptors pop up across several asset management categories: “ghost

Sarah Hartland
A Summer of Awards for JupiterOne
October 3, 2022
Blog
A summer of awards for JupiterOne

Summer 2022 has been prime time for awards and we are excited to announce four awards that JupiterOne and CEO and founder Erkang Zheng won.

Danielle Schmidt
Why IT Teams Should Be Using JupiterOne
September 29, 2022
Blog
Why IT teams should be using JupiterOne

The type of infrastructure your organization is leveraging (Cloud / Hybrid / On-Prem) may already be complex, or is heading in that direction. New products are added,

Josh Mattox
Don’t be a (privilege) creep! 3+1 best practices for effective access reviews
September 28, 2022
Blog
Don’t be a (privilege) creep! 3+1 best practices for effective access reviews

Security practitioners are no strangers to long, manual processes - especially the kind that are neglected for so long that they end up in the abyss of the backlog.

  • IAM
Tanvi Tapadia
Reduce Hours Dedicated to Compliance Certifications by 75% with JupiterOne
September 27, 2022
Blog
Reduce hours dedicated to compliance certifications by 75% with JupiterOne

Regulatory compliance is a necessary headache for all sizable organizations. Aside from avoiding costly government fines, reaching SOC2 or CIS compliance is a quality

Sarah Hartland
Security vs. Safety: Should We Reframe Cybersecurity to Make It More Recession-Proof?
September 21, 2022
Blog
Security vs. safety: should we reframe cybersecurity to make it more recession-proof?

Do a quick Google search for the terms “security” and “safety,” and this is what you’ll get: Security: the state of being free from danger or threat Safety: the con

JupiterOne Team
How to Prioritize Vulnerabilities by Real Business Impact
September 14, 2022
Blog
How to prioritize vulnerabilities by real business impact

Nobody would argue that vulnerability scanners are a negative addition to the cybersecurity landscape. These days, it’s much easier to catch vulnerabilities and be

  • SecOps
Sarah Hartland
In 2020 Did We Open a Security ‘Pandora's box’ We Have Yet to Close?
September 12, 2022
Blog
In 2020 did we open a security ‘pandora's box’ we have yet to close?

It’s March 2020. Mandatory stay-at-home orders have just gone into effect, and your organization is scrambling to nail down WFH policies while your IT team is tasked

JupiterOne Team
Navigating Cloud Security Posture Management Vendors
September 7, 2022
Blog
Navigating cloud security posture management vendors

The modern attack surface is an ever-evolving organism that requires constant vigilance. Verizon’s 2022 Data Breach Investigation Report states that the 13% jump in

  • CSPM
  • CAASM
Tanvi Tapadia
Cost Savings or Suck? How to Turn the Cloud Into a Cost Saver
August 29, 2022
Blog
Cost savings or suck? How to turn the cloud into a cost saver

Security practitioners are well versed in the concept of risk. The risk that’s currently on everyone’s minds? If you guessed the possibility of an impending recession

  • CSPM
JupiterOne Team
Cybersecurity doesn’t have to suck. Let’s fight cynicism and burnout.
August 25, 2022
Blog
Cybersecurity doesn’t have to suck. Let’s fight cynicism and burnout.

Amidst all of the learning and conversations I had in Vegas during Hacker Summer Camp, this quote wormed its way into my brain, bothering me like a scab over a wound

  • CAASM
Ashleigh Lee
Optimizing your Splunk SOAR deployment with JupiterOne
August 24, 2022
Blog
Optimizing your Splunk SOAR deployment with JupiterOne

You’ve probably already heard about our recent partnership announcement with Splunk. (Wait, you haven’t? Well, check it out here!)

  • SecOps
Ale Espinosa
Solving a '20s Problem When the Market Offers Solutions from the '90s
August 19, 2022
Blog
Solving a '20s problem when the market offers solutions from the '90s

As organizations increase their reliance on the cloud to quickly and cost-effectively scale their digital operations, new security challenges arise. The convenience

Danielle Schmidt
Highlights from Hacker Summer Camp 2022
August 18, 2022
Blog
Highlights from Hacker Summer Camp 2022

JupiterOne was in incubation mode the last time everyone gathered in the sweltering heat of Vegas for #hackersummercamp, so here’s a recap of our experience!

Ashleigh Lee
3 Risk Management Exercises to Prepare for a Recession
August 15, 2022
Blog
3 risk management exercises to prepare for a recession

While economists debate the technicalities of whether we are in a recession or not, the rest of us are left preparing ourselves for a downturn. With a wave of tech

  • CSPM
  • CAASM
  • SecOps
Sarah Hartland
JupiterOne participates in new Open Cybersecurity Schema Framework (OCSF) industry initiative
August 10, 2022
Blog
JupiterOne participates in new Open Cybersecurity Schema Framework (OCSF) industry initiative

At JupiterOne, we recognize the importance of building community — not just for the benefit of every cybersecurity professional out there, but for the organizations

  • CSPM
  • CAASM
Erkang Zheng
Engineering Spotlight: Samuel Poulton
August 9, 2022
Blog
Engineering spotlight: Samuel Poulton

How does one go from hating their computer science class to becoming an engineer anyways? That’s what one of our Senior Software Engineers, Samuel Poulton, did!

  • SecOps
Tanvi Tapadia
The Ultimate CAASM Guide for 2022
August 3, 2022
Blog
The Ultimate CAASM Guide for 2022

Cybersecurity is all about cyber assets, attack surface management, and understanding cyber asset context. When companies are hacked, be it through their software

  • CSPM
  • CAASM
Jennie Duong
Boston Events Recap - AWS re:Inforce 2022 and fwd:cloudsec
August 2, 2022
Blog
Boston events recap - AWS re:Inforce 2022 and fwd:cloudsec

The JupiterOne team kicked off the week at fwd:cloudsec where Field Security Director Jasmine Henry shared her latest research in the session “A Tacky Graph and

  • CSPM
  • CAASM
  • SecOps
Ashleigh Lee
JupiterOne and Orca Security Partner to Improve Cloud Security
July 28, 2022
Blog
JupiterOne and Orca Security partner to improve cloud security

Our new partnership helps security teams combine cloud application and workload telemetry with cyber asset information from the entire tech stack to secure cloud

  • CSPM
  • CAASM
  • Vuln Mgmt
  • IR
  • SecOps
Jenn Cardamone
Gartner Shares Innovative Tech for Your Shifting Attack Surface
July 20, 2022
Blog
Gartner shares innovative tech for your shifting attack surface

As innovative organizations scale their cloud environments, their attack surface expands in tandem. With the ways attackers operate today, the slightest, smallest gap

  • CAASM
  • SecOps
Tanvi Tapadia
The Summer of JupiterOne Continues
July 14, 2022
Blog
The summer of JupiterOne continues

Summer conference season is always busy, but this year has been especially jam-packed with conference organizers cramming some of the biggest conferences in a few

Valerie Zargarpur
Accelerating Incident Response with JupiterOne's New Insights Dashboards
July 12, 2022
Blog
Accelerating incident response with JupiterOne's new insights dashboards

When you can’t account for every single cyber asset in your digital environment and you want to conduct a security investigation or run a query to retrieve specific

  • CSPM
  • CAASM
  • SecOps
Ale Espinosa
Better Together: Cybersecurity Asset Management and External Attack Surface Management
July 7, 2022
Blog
Better together: cybersecurity asset management and external attack surface management

Today, we’ll dig deeper into attack surface management and explore the benefits and differences across cybersecurity asset management (CSAM), external attack surface

  • CSPM
  • CAASM
  • SecOps
Ashleigh Lee
Five Strategic Priorities for the Modern CISO
June 22, 2022
Blog
Five Strategic Priorities for the Modern CISO

The modern Chief Information Security Executive (CISO) is a vast, strategic, and expanding role. In a world where every organization competes on technology, the CISO

Latha Maripuri
Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22
June 21, 2022
Blog
Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22

This week, we packed our green pants and sunglasses and headed over to Las Vegas for Cisco Live! and Splunk .conf22 to spend quality time with our partners, exhibit

Ale Espinosa
The Importance of Cybersecurity Asset Management in 2022
June 15, 2022
Blog
The Importance of Cybersecurity Asset Management in 2022

In March we published The 2022 State of Cyber Assets Report to share how the proliferation of software-defined assets has changed the topology of attack surface

  • CSPM
  • CAASM
  • SecOps
Jennie Duong
Highlights of RSAC 2022
June 10, 2022
Blog
Highlights of RSAC 2022

“The Human Element” was the theme of RSAC 2020, just as COVID-19 was making its way across the world and sending us into a global pandemic. This year, at RSAC 2022,

Ashleigh Lee
Say Hello in San Francisco: RSAC 2022
June 6, 2022
Blog
Say Hello in San Francisco: RSAC 2022

If these first few days of June are any indication of how the rest of the Summer of JupiterOne is going to go, I’d say we’re all in for a treat. After announcing a

Tanvi Tapadia
JupiterOne Achieves $1B+ Valuation with $70M Series C: The Next Step in Our Journey
June 2, 2022
Blog
JupiterOne Achieves $1B+ Valuation with $70M Series C: The Next Step in Our Journey

It’s a big day for us here at JupiterOne. We just closed a $70M Series C funding round, achieving a $1B+ valuation, and welcomed new investors to the JupiterOne

  • CAASM
Erkang Zheng
JupiterOne + Splunk = Greater Visibility and Context to Optimize Security Operations
June 1, 2022
Blog
JupiterOne + Splunk = Greater Visibility and Context to Optimize Security Operations

Good news for JupiterOne and Splunk users! Our companies have joined forces to help make the cyber-world a safer place. This partnership gives our customers the

  • SecOps
  • CSPM
  • CAASM
Jenn Cardamone
The Summer of JupiterOne
May 25, 2022
Blog
The Summer of JupiterOne

This summer is shaping up to be one of the busiest summers in years! We’re really excited to hang out with friends, old and new, at the upcoming events during what

Valerie Zargarpur
Engineering Spotlight: Neal Patel
May 17, 2022
Blog
Engineering Spotlight: Neal Patel

Nothing in life is really linear. Reaching our goals often involves setbacks, changed plans, or evolving motives or values. In the moment, it can be hard to grasp you

Tanvi Tapadia
Blind Spots Turn Cybersecurity into a Big Data Search Problem
May 10, 2022
Blog
Blind Spots Turn Cybersecurity into a Big Data Search Problem

Orphaned assets are a familiar story for every cybersecurity professional. Like something out of a horror movie, these legacy devices lurk neglected, forgotten, and

  • CAASM
Jasmine Henry
Third-party Code and Supply Chain Security Increase Complexity and Risk
May 6, 2022
Blog
Third-party Code and Supply Chain Security Increase Complexity and Risk

To paraphrase the tagline of Capital One’s credit card ads: What’s in your enterprise code? For many companies, the answer to that question has brought considerable

  • CAASM
Jasmine Henry
JupiterOne Press Book Release: Reinventing Cybersecurity
May 3, 2022
Blog
JupiterOne Press Book Release: Reinventing Cybersecurity

Reinvention is certainly not a new idea, especially for cybersecurity practitioners who are continuously challenged to adapt to new threats, an expanding attack

Jasmine Henry
Using JupiterOne to Find Unqualified Lambda ARNs Before They Cause a Production Outage
April 28, 2022
Blog
Using JupiterOne to Find Unqualified Lambda ARNs Before They Cause a Production Outage

A couple of months ago, we received the following email from AWS: Hello, You are receiving this email because AWS Lambda is making a change to the IAM policy

Ben Johnson
JupiterOne Adds Orca Security, Snyk, Qualys and Veracode Integrations to Expand Vulnerability Management Capabilities
April 28, 2022
Blog
JupiterOne Adds Orca Security, Snyk, Qualys and Veracode Integrations to Expand Vulnerability Management Capabilities

“Know what you have, focus on what matters.” That’s our mantra. While that usually directs people toward taking stock of their cyber assets, it also means that you

Tanvi Tapadia
The Next-Gen Cloud Security Posture Management Guide | CSPM
April 28, 2022
Blog
The Next-Gen Cloud Security Posture Management Guide | CSPM+

Organizations are transitioning to the cloud at a rate faster than ever. As your company’s cloud presence grows, so does the importance of your cloud security posture

  • CAASM
  • CSPM
Jennie Duong
Ultra-reliable, Dynamic Network Architecture Demands Automated Security
April 26, 2022
Blog
Ultra-reliable, Dynamic Network Architecture Demands Automated Security

In the modern world, speed is everything. Customers demand constant innovation, while sudden market disruption makes agility essential for survival. To remain

  • CAASM
Jasmine Henry
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.