Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cybersecurity doesn’t have to suck. Let’s fight cynicism and burnout.
August 25, 2022
Blog
Cybersecurity doesn’t have to suck. Let’s fight cynicism and burnout.

Amidst all of the learning and conversations I had in Vegas during Hacker Summer Camp, this quote wormed its way into my brain, bothering me like a scab over a wound

  • CAASM
Optimizing your Splunk SOAR deployment with JupiterOne
August 24, 2022
Blog
Optimizing your Splunk SOAR deployment with JupiterOne

You’ve probably already heard about our recent partnership announcement with Splunk. (Wait, you haven’t? Well, check it out here!)

  • SecOps
Solving a '20s Problem When the Market Offers Solutions from the '90s
August 19, 2022
Blog
Solving a '20s problem when the market offers solutions from the '90s

As organizations increase their reliance on the cloud to quickly and cost-effectively scale their digital operations, new security challenges arise. The convenience

Highlights from Hacker Summer Camp 2022
August 18, 2022
Blog
Highlights from Hacker Summer Camp 2022

JupiterOne was in incubation mode the last time everyone gathered in the sweltering heat of Vegas for #hackersummercamp, so here’s a recap of our experience!

3 Risk Management Exercises to Prepare for a Recession
August 15, 2022
Blog
3 risk management exercises to prepare for a recession

While economists debate the technicalities of whether we are in a recession or not, the rest of us are left preparing ourselves for a downturn. With a wave of tech

  • CSPM
  • CAASM
  • SecOps
JupiterOne participates in new Open Cybersecurity Schema Framework (OCSF) industry initiative
August 10, 2022
Blog
JupiterOne participates in new Open Cybersecurity Schema Framework (OCSF) industry initiative

At JupiterOne, we recognize the importance of building community — not just for the benefit of every cybersecurity professional out there, but for the organizations

  • CSPM
  • CAASM
Engineering Spotlight: Samuel Poulton
August 9, 2022
Blog
Engineering spotlight: Samuel Poulton

How does one go from hating their computer science class to becoming an engineer anyways? That’s what one of our Senior Software Engineers, Samuel Poulton, did!

  • SecOps
The Ultimate CAASM Guide for 2022
August 3, 2022
Blog
The Ultimate CAASM Guide for 2022

Cybersecurity is all about cyber assets, attack surface management, and understanding cyber asset context. When companies are hacked, be it through their software

  • CSPM
  • CAASM
Boston Events Recap - AWS re:Inforce 2022 and fwd:cloudsec
August 2, 2022
Blog
Boston events recap - AWS re:Inforce 2022 and fwd:cloudsec

The JupiterOne team kicked off the week at fwd:cloudsec where Field Security Director Jasmine Henry shared her latest research in the session “A Tacky Graph and

  • CSPM
  • CAASM
  • SecOps
JupiterOne and Orca Security Partner to Improve Cloud Security
July 28, 2022
Blog
JupiterOne and Orca Security partner to improve cloud security

Our new partnership helps security teams combine cloud application and workload telemetry with cyber asset information from the entire tech stack to secure cloud

  • CSPM
  • CAASM
  • Vuln Mgmt
  • IR
  • SecOps
Gartner Shares Innovative Tech for Your Shifting Attack Surface
July 20, 2022
Blog
Gartner shares innovative tech for your shifting attack surface

As innovative organizations scale their cloud environments, their attack surface expands in tandem. With the ways attackers operate today, the slightest, smallest gap

  • CAASM
  • SecOps
The Summer of JupiterOne Continues
July 14, 2022
Blog
The summer of JupiterOne continues

Summer conference season is always busy, but this year has been especially jam-packed with conference organizers cramming some of the biggest conferences in a few

Accelerating Incident Response with JupiterOne's New Insights Dashboards
July 12, 2022
Blog
Accelerating incident response with JupiterOne's new insights dashboards

When you can’t account for every single cyber asset in your digital environment and you want to conduct a security investigation or run a query to retrieve specific

  • CSPM
  • CAASM
  • SecOps
Better Together: Cybersecurity Asset Management and External Attack Surface Management
July 7, 2022
Blog
Better together: cybersecurity asset management and external attack surface management

Today, we’ll dig deeper into attack surface management and explore the benefits and differences across cybersecurity asset management (CSAM), external attack surface

  • CSPM
  • CAASM
  • SecOps
Five Strategic Priorities for the Modern CISO
June 22, 2022
Blog
Five Strategic Priorities for the Modern CISO

The modern Chief Information Security Executive (CISO) is a vast, strategic, and expanding role. In a world where every organization competes on technology, the CISO

Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22
June 21, 2022
Blog
Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22

This week, we packed our green pants and sunglasses and headed over to Las Vegas for Cisco Live! and Splunk .conf22 to spend quality time with our partners, exhibit

The Importance of Cybersecurity Asset Management in 2022
June 15, 2022
Blog
The Importance of Cybersecurity Asset Management in 2022

In March we published The 2022 State of Cyber Assets Report to share how the proliferation of software-defined assets has changed the topology of attack surface

  • CSPM
  • CAASM
  • SecOps
Highlights of RSAC 2022
June 10, 2022
Blog
Highlights of RSAC 2022

“The Human Element” was the theme of RSAC 2020, just as COVID-19 was making its way across the world and sending us into a global pandemic. This year, at RSAC 2022,

Say Hello in San Francisco: RSAC 2022
June 6, 2022
Blog
Say Hello in San Francisco: RSAC 2022

If these first few days of June are any indication of how the rest of the Summer of JupiterOne is going to go, I’d say we’re all in for a treat. After announcing a

JupiterOne Achieves $1B+ Valuation with $70M Series C: The Next Step in Our Journey
June 2, 2022
Blog
JupiterOne Achieves $1B+ Valuation with $70M Series C: The Next Step in Our Journey

It’s a big day for us here at JupiterOne. We just closed a $70M Series C funding round, achieving a $1B+ valuation, and welcomed new investors to the JupiterOne

  • CAASM
JupiterOne + Splunk = Greater Visibility and Context to Optimize Security Operations
June 1, 2022
Blog
JupiterOne + Splunk = Greater Visibility and Context to Optimize Security Operations

Good news for JupiterOne and Splunk users! Our companies have joined forces to help make the cyber-world a safer place. This partnership gives our customers the

  • SecOps
  • CSPM
  • CAASM
The Summer of JupiterOne
May 25, 2022
Blog
The Summer of JupiterOne

This summer is shaping up to be one of the busiest summers in years! We’re really excited to hang out with friends, old and new, at the upcoming events during what

Why Your Business Needs Cloud Asset Management
May 19, 2022
Blog
Why Your Business Needs Cloud Asset Management

Organizations are transitioning to the cloud faster than ever to keep up with the changing consumer and business climate. According to Gartner, by 2023, 40% of all

  • CSPM
  • CAASM
Engineering Spotlight: Neal Patel
May 17, 2022
Blog
Engineering Spotlight: Neal Patel

Nothing in life is really linear. Reaching our goals often involves setbacks, changed plans, or evolving motives or values. In the moment, it can be hard to grasp you

What's the Difference Between Attack Surface Management and Vulnerability Management?
May 12, 2022
Blog
What's the Difference Between Attack Surface Management and Vulnerability Management?

The rapid evolution of how software and businesses are built has wreaked havoc on traditional IT asset management and vulnerability management practices, giving birth

  • CSPM
  • CAASM
  • SecOps
  • Vuln Mgmt
Blind Spots Turn Cybersecurity into a Big Data Search Problem
May 10, 2022
Blog
Blind Spots Turn Cybersecurity into a Big Data Search Problem

Orphaned assets are a familiar story for every cybersecurity professional. Like something out of a horror movie, these legacy devices lurk neglected, forgotten, and

  • CAASM
Where to Find the JupiterOne Team in May
May 6, 2022
Blog
Where to Find the JupiterOne Team in May

The JupiterOne team is excited to return to in-person events and share a drink or chat with you. May will be a great warm-up to the “Summer of JupiterOne,” a jam-pack

Third-party Code and Supply Chain Security Increase Complexity and Risk
May 6, 2022
Blog
Third-party Code and Supply Chain Security Increase Complexity and Risk

To paraphrase the tagline of Capital One’s credit card ads: What’s in your enterprise code? For many companies, the answer to that question has brought considerable

  • CAASM
JupiterOne Press Book Release: Reinventing Cybersecurity
May 3, 2022
Blog
JupiterOne Press Book Release: Reinventing Cybersecurity

Reinvention is certainly not a new idea, especially for cybersecurity practitioners who are continuously challenged to adapt to new threats, an expanding attack

Using JupiterOne to Find Unqualified Lambda ARNs Before They Cause a Production Outage
April 28, 2022
Blog
Using JupiterOne to Find Unqualified Lambda ARNs Before They Cause a Production Outage

A couple of months ago, we received the following email from AWS: Hello, You are receiving this email because AWS Lambda is making a change to the IAM policy

JupiterOne Adds Orca Security, Snyk, Qualys and Veracode Integrations to Expand Vulnerability Management Capabilities
April 28, 2022
Blog
JupiterOne Adds Orca Security, Snyk, Qualys and Veracode Integrations to Expand Vulnerability Management Capabilities

“Know what you have, focus on what matters.” That’s our mantra. While that usually directs people toward taking stock of their cyber assets, it also means that you

The Next-Gen Cloud Security Posture Management Guide | CSPM
April 28, 2022
Blog
The Next-Gen Cloud Security Posture Management Guide | CSPM+

Organizations are transitioning to the cloud at a rate faster than ever. As your company’s cloud presence grows, so does the importance of your cloud security posture

  • CAASM
  • CSPM
Ultra-reliable, Dynamic Network Architecture Demands Automated Security
April 26, 2022
Blog
Ultra-reliable, Dynamic Network Architecture Demands Automated Security

In the modern world, speed is everything. Customers demand constant innovation, while sudden market disruption makes agility essential for survival. To remain

  • CAASM
Cyber asset context is like six degrees of Kevin Bacon
April 19, 2022
Blog
Cyber asset context is like six degrees of Kevin Bacon

There are two converging problems for security operations resulting in a big flaming dumpster fire - the expanding modern attack surface and an ever-growing backlog

  • CAASM
Introducing Critical Assets - Building Blocks to Secure Your Cyber Asset "Crown Jewels"
April 14, 2022
Blog
Introducing Critical Assets - Building Blocks to Secure Your Cyber Asset "Crown Jewels"

Complete cyber asset inventory and visibility is foundational to any security program and strategy. We’ve written a number of pieces that share this sentiment

  • CAASM
  • SecOps
Empowering Security with Critical Assets & Connecting Business Context
April 14, 2022
Blog
Empowering Security with Critical Assets & Connecting Business Context

You’ve identified and collected all your cyber assets into one place. Now what? There are thousands, or even hundreds of thousands assets and potentially countless

  • CAASM
  • SecOps
Where to Find the JupiterOne Team in April
April 6, 2022
Blog
Where to Find the JupiterOne Team in April

After a busy start to 2022, April almost feels like we are taking a breather—a spring break, if you will. While April will be relatively quieter compared to the begin

Growing Security Skills Gap Calls for a New Approach to Training
April 5, 2022
Blog
Growing Security Skills Gap Calls for a New Approach to Training

As the scope of the cyber hygiene challenge outpaces the expert resources available, security teams are losing ground in the effort to protect their organization

  • CAASM
Expanding Attack Surface and Cybersecurity Alert Fatigue Hinder Cyber Hygiene Basics
March 29, 2022
Blog
Expanding Attack Surface and Cybersecurity Alert Fatigue Hinder Cyber Hygiene Basics

Cybersecurity alert fatigue is an issue that is long overdue for a real solution. The average cybersecurity team is facing a backlog of 120,561 findings and alerts

  • CSPM
  • CAASM
  • SecOps
How To Automate "Meeting Evidence" As Code
March 24, 2022
Blog
How To Automate "Meeting Evidence" As Code

Last month, Yvie Djieya wrote a blog post describing how JupiterOne’s security team manages “meeting evidence” as code. Yvie covered the difficulty of managing

  • SecOps
Introducing the 2022 State of Cyber Assets Report
March 22, 2022
Blog
Introducing the 2022 State of Cyber Assets Report

Complete cyber asset inventory and visibility is foundational to any security program and strategy. We’ve written a number of pieces that share this sentiment

  • CAASM
Why Security Practitioners Often Misjudge Risk to Cyber Assets
March 17, 2022
Blog
Why Security Practitioners Often Misjudge Risk to Cyber Assets

Digital transformation has created remarkable and irreversible growth in the cyber asset landscape. Each business shift towards digital workflows has yielded a steady

  • CAASM
Engineering Spotlight: Ben Johnson
March 15, 2022
Blog
Engineering Spotlight: Ben Johnson

There’s nothing better than hiring an engineer that takes true pleasure in solving highly complex, brain-bending problems. That’s what we saw when we talked to Ben

How We Generate a Software Bill of Materials (SBOM) with CycloneDX
March 9, 2022
Blog
How We Generate a Software Bill of Materials (SBOM) with CycloneDX

Generating a software bill of materials (SBOM) is no small feat. In this post, I’ll walk through the steps I used to generate our SBOM when Sounil Yu joined the

  • CAASM
  • SecOps
13 Resources for Cybersecurity Pros & How to Avoid Burnout
March 3, 2022
Blog
13 Resources for Cybersecurity Pros & How to Avoid Burnout

In this post, I’m sharing my favorite resources to stay on top of all the things cloud, security, and self-improvement—because mental well-being is crucial to success

  • CSPM
Where to Find the JupiterOne Team in March
March 2, 2022
Blog
Where to Find the JupiterOne Team in March

The saying goes, “March comes in like a lion, and goes out like a lamb.” While we all think lambs are adorable, there are no lambs here because the JupiterOne team is

JupiterOne Adds Microsoft 365, Salesforce, and Google Workspaces SaaS Applications to Integrations Ecosystem
March 1, 2022
Blog
JupiterOne Adds Microsoft 365, Salesforce, and Google Workspaces SaaS Applications to Integrations Ecosystem

JupiterOne has a much broader definition of cyber assets than other security vendors, covering more than just IP addresses, devices, and internet facing-assets.

How JupiterOne's DevOps Team Uses CAASM to Understand Service Coupling & Deployment Order
February 24, 2022
Blog
How JupiterOne's DevOps Team Uses CAASM to Understand Service Coupling & Deployment Order

In the current microservice landscape, there are more than enough automation tools and infrastructure as code (IaC) solutions to make deployments swift and effortless

  • CAASM
Democratizing Graph-Based Security: Introducing Starbase
February 23, 2022
Blog
Democratizing Graph-Based Security: Introducing Starbase

Security is a basic human right, but many security teams struggle to answer even seemingly basic questions about attack surface or blast radius due to poor visibility

  • CSPM
  • CAASM
  • SecOps
Launching Starbase: A New Open-Source Contribution from JupiterOne
February 23, 2022
Blog
Launching Starbase: A New Open-Source Contribution from JupiterOne

I started JupiterOne with two strong core beliefs that shape how to address the technical challenges I was facing and overall battles in the cybersecurity industry as

  • CSPM
  • CAASM
  • SecOps
Does Your CAASM Tool Capture Transitive Risk? It Really Should.
February 16, 2022
Blog
Does Your CAASM Tool Capture Transitive Risk? It Really Should.

You are likely familiar with the cybersecurity adage: “You can’t protect what you don’t know about.” It’s common-sense enough wisdom, but if we’re being honest, we

  • CAASM
J1 Spotlight: Patricia Arnedo, Software Engineer
February 14, 2022
Blog
J1 Spotlight: Patricia Arnedo, Software Engineer

Individuals in STEM are often described as innately methodical, detail-oriented, and curious. However, their creative, artistic qualities are the ones that make them

JupiterOne Press Releases New Book: Cyber Defense Matrix
February 10, 2022
Blog
JupiterOne Press Releases New Book: Cyber Defense Matrix

In a world where cybersecurity threats evolve and proliferate at dizzying speed, a confusing and disordered cybersecurity landscape makes it all too difficult to

  • CAASM
  • GRC
  • SecOps
Building a Healthy Cybersecurity Culture
February 9, 2022
Blog
Building a Healthy Cybersecurity Culture

Every company has a workplace culture and a security culture. Many people would define the former as “flexible PTO and cold brew on tap” (which, of course, is a gross

Case Study: Auth0 Reduces Third-Party & Cloud Asset Risk with JupiterOne
February 8, 2022
Blog
Case Study:  Auth0 Reduces Third-Party & Cloud Asset Risk with JupiterOne

Auth0 helps enterprise companies solve the most complex, large-scale identity use cases with its extensible and developer-friendly solution. To get to that level of

  • CAASM
  • SecOps
How JupiterOne's Security Team Manages "Meeting Evidence" as Code
February 7, 2022
Blog
How JupiterOne's Security Team Manages "Meeting Evidence" as Code

If you’re anything like me (which I hope you’re not), or let’s say if you’re anything like my mind, you spend 75% of your time overthinking. You reach for the closest

  • SecOps
JupiterOne Takes Home the Gold in Cybersecurity Excellence Awards
February 4, 2022
Blog
JupiterOne Takes Home the Gold in Cybersecurity Excellence Awards

We are honored to announce our company founder and Chief Executive Officer Erkang Zheng, named as Cybersecurity CEO of the Year-North America by the Cybersecurity

Introducing Compliance 2.0 - Compliance is the Byproduct of Great Security
February 3, 2022
Blog
Introducing Compliance 2.0 - Compliance is the Byproduct of Great Security

Many companies invest in compliance activities to follow various laws and regulations but not necessarily to improve their overall security posture. Whether you are

  • GRC
The OWASP Podcast: New Ideas. New Voices. New Hosts.
February 2, 2022
Blog
The OWASP Podcast: New Ideas. New Voices. New Hosts.

Eight years ago I took over the OWASP Podcast from Jim Manico, originator of the project. In that time 160 episodes have been published, with over 500,000 downloads

Where to Find the JupiterOne Team in February
February 2, 2022
Blog
Where to Find the JupiterOne Team in February

February is normally the big kick-off to the security conference circuit. Although the RSA Conference has been postponed to June, the JupiterOne team won’t be taking

This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.