Mission Control Blog
The new JupiterOne Query Builder streamlines your querying experience by eliminating errors, simplifying query builds, and reducing time to value.
We polled some of our engineering leaders to see what it takes to succeed. In part two, we see if their answers align with the CISOs we talked to.
As a preventative measure, Github will be deprecating the Mac and Windows signing certificates used to sign Desktop app versions 3.0.2-3.1.2 and Atom versions 1.63.0-
In part one of this two-part series, we polled some of our top security experts to see what it takes to succeed secure and manage resources effectively.
Review of some of the notable new features and updates to JupiterOne from 2022.
Take a look at the top 5 episodes from Season 1 of Cyber Therapy, a video podcast featuring the humans of cybersecurity!
Switching to a new technology solution can be a gamble. With the right information to make your decision, you can be guided to base your purchase on a validated econo
We’ve revamped the JupiterOne Homepage and Questions Library so you can spend less time asking questions and more time getting to the bottom of any issue.
Learn about the open source cybersecurity tools available to your organization, and why you should use them.
Traditional, relational databases are not equipped to meet the demands of a complex, cloud-native, hybrid, or multi-cloud environment. Luckily, graph databases can.
Kelly Shortridge, Fastly Senior Principal, Product Technology, offered her security predictions for 2023 as part of a CSA panel discussion webinar to close out 2022.
If you are a LastPass customer, the only thing standing between an attacker and your decrypted vault is a weak password. Find those easily with JupiterOne.
A lot of things go into creating an enterprise vulnerability management strategy. Learn how to build a strategy that will meet the unique needs of your organization.
- Vuln Mgmt
Incorporating a vulnerability management workflow will make your vulnerability management efforts and tools more effective and reliable.
- Vuln Mgmt
How long does it take you to find out you've become noncompliant? Continuous compliance solutions go beyond point-in-time checks to ensure compliance at all times.
- Compliance
25 cybersecurity conferences we recommend (and will also attend!).
We are releasing j1nuclei, an open-source tool to automate vulnerability scanning. The tool is available to anyone using the free version of JupiterOne.
Vulnerability management tools are an important part of enterprise cybersecurity. Choosing the right tool will make a huge difference in your cybersecurity program.
- Vuln Mgmt
Attack surface analysis is the process of identifying and mapping the areas in your attack surface that need to be reviewed for gaps and vulnerabilities by way of con
To help organizations of all sizes secure their cloud assets, JupiterOne announced a number of key initiatives with AWS this week at re:Invent.
- CSPM
- CAASM
In a recent debate on cybersecurity predictions for 2023, panelists disagreed on plenty. But they agreed: in 2023, security will give up on users as a line of defense
The new Properties Panel and Managed Dashboards in the JupiterOne platform empower you to prioritize speed, efficiency, and organization!
Our redefined process has made JupiterOne security’s vendor assessments significantly more enjoyable, effective, and streamlined. I hope our lessons learned help you
Vulnerability management systems play a crucial role in organizations' defenses by identifying and evaluating vulnerabilities for cybersecurity teams to act on.
- Vuln Mgmt
What's next for cloud security? Four security leaders shared their predictions for what we'll see in 2023 - and we don't think he's far off.
- CSPM
What if ‘shoestring budget’ were a state of mind as opposed to a fiscal reality for some of us? I still think many of the best compliance solutions are available at s
Attack surface visibility is the key to a secure cloud native platform. Visit JupiterOne to see how our platform makes it easy to monitor your entire landscape.
Recently, we sat down with four security leaders to hear their top security predictions for 2023. Here are 12 more predictions that didn’t make the cut in the origina
The JupiterOne research team has been analyzing data from 2,285 organizations to better understand the attack surface and attack paths. This article discusses what th
It’s not often you get to make big changes in your career, but I’ve been lucky enough to do so recently with a move to London and a shift in the role from being a CIS
Cybersecurity professionals use the term ‘attack surface’ to describe the totality of all potential entry points into their environment, and may refer to a particular
- CAASM
In “A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface,” JupiterOne researchers expand upon the 2022 State of Cyber Assets Report analysis to be
By now, it’s likely that you’ve heard the term “attack surface,” which is the summation of all the possible risk exposures, vulnerabilities, and controls across your
- CAASM
In 2021, SOC 2 took the crown for most popular audit for cybersecurity, IT, quality assurance, internal audit, finance, and other industries. SOC 2 is a voluntary com
For most people, compliance is stressful. Tracking down relevant paperwork, heavy workloads, deadlines that always seem too close, and the issue of “passing” an audit
The CISO’s role is not for the faint-hearted. In their hands and the hands of their team lies a massive responsibility – keeping the organization safe from security
- CAASM
The average security team is responsible for 165,633 cyber assets and is likely to have additional ghost assets lurking in their environments. Cyber asset identificat
- CAASM
People always tell you to get your head out of the clouds. In the case of today’s rapid migration towards cloud-based, software-defined, and everything-as-a-service
- CAASM
- GRC
The need for comprehensive cybersecurity is the greatest it's ever been, with no signs of slowing down. We have a backlog problem. Security practitioners everywhere
We’ve reached a new milestone! Today, we’re excited to announce the official launch of JupiterOne’s Stellar Partner Program. Our company is founded on partnerships,
It's October, which means that, in addition to ghosts and goblins, it's also National Cybersecurity Awareness Month! The Department of Homeland Security and the Natio
There's likely two reasons you've come across this blog: one, you've recently experienced a data breach or two, you want to prepare yourself in the event of a data br
Ghosts, zombies, and shadows are not just the stuff of spooky movies and Halloween haunts. These descriptors pop up across several asset management categories: “ghost
Summer 2022 has been prime time for awards and we are excited to announce four awards that JupiterOne and CEO and founder Erkang Zheng won.
The type of infrastructure your organization is leveraging (Cloud / Hybrid / On-Prem) may already be complex, or is heading in that direction. New products are added,
Security practitioners are no strangers to long, manual processes - especially the kind that are neglected for so long that they end up in the abyss of the backlog.
- IAM
Regulatory compliance is a necessary headache for all sizable organizations. Aside from avoiding costly government fines, reaching SOC2 or CIS compliance is a quality
Do a quick Google search for the terms “security” and “safety,” and this is what you’ll get: Security: the state of being free from danger or threat Safety: the con
It’s March 2020. Mandatory stay-at-home orders have just gone into effect, and your organization is scrambling to nail down WFH policies while your IT team is tasked
The modern attack surface is an ever-evolving organism that requires constant vigilance. Verizon’s 2022 Data Breach Investigation Report states that the 13% jump in
- CSPM
- CAASM
Security practitioners are well versed in the concept of risk. The risk that’s currently on everyone’s minds? If you guessed the possibility of an impending recession
- CSPM
Amidst all of the learning and conversations I had in Vegas during Hacker Summer Camp, this quote wormed its way into my brain, bothering me like a scab over a wound
- CAASM
You’ve probably already heard about our recent partnership announcement with Splunk. (Wait, you haven’t? Well, check it out here!)
- SecOps
As organizations increase their reliance on the cloud to quickly and cost-effectively scale their digital operations, new security challenges arise. The convenience
JupiterOne was in incubation mode the last time everyone gathered in the sweltering heat of Vegas for #hackersummercamp, so here’s a recap of our experience!
While economists debate the technicalities of whether we are in a recession or not, the rest of us are left preparing ourselves for a downturn. With a wave of tech
- CSPM
- CAASM
- SecOps
At JupiterOne, we recognize the importance of building community — not just for the benefit of every cybersecurity professional out there, but for the organizations
- CSPM
- CAASM
How does one go from hating their computer science class to becoming an engineer anyways? That’s what one of our Senior Software Engineers, Samuel Poulton, did!
- SecOps
Cybersecurity is all about cyber assets, attack surface management, and understanding cyber asset context. When companies are hacked, be it through their software
- CSPM
- CAASM
The JupiterOne team kicked off the week at fwd:cloudsec where Field Security Director Jasmine Henry shared her latest research in the session “A Tacky Graph and
- CSPM
- CAASM
- SecOps
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.