Mission Control Blog
When Colonial Pipeline CEO Joseph Blount testified before the US Congress, he revealed that the attack was completely avoidable; Blount admitted that Darkside gained
- CAASM
- SecOps
On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.
- SecOps
JupiterOne recently added support for ingesting GitHub Org, Repo, and Environment secrets.
- CAASM
On October 19, 2021, we published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". Over the next few weeks, we'll be publishing excerpts from the
- CSPM
- CAASM
The speed of change and the tools of adversaries make it extremely hard to envision a long-term, executable vision for the future of security. However, without ponder
- CAASM
Team retreats are an excellent way to bring a company together. For a remote-first company like JupiterOne, I’d say they are essential. It is a great way to strengthe
Identity and Access Management (IAM) for Google Cloud uses IAM Role Bindings, which link three constructs together
- IAM
You open your email and there it is. Finally, the company that you really wanted to work for has extended you an offer. You feel a rush of adrenaline as you open it
- GRC
I’m the Director of Cybersecurity at Esper, a cloud-native startup that offers powerful cloud tooling for Android device deployment and application management at scal
- GRC
Our customers are at the core of everything we do at JupiterOne. And every security strategy and journey is different for every customer. JupiterOne is starting a mon
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b
We’re honored to share that JupiterOne has been recognized for its innovation, excellence, and growth as part of the 2021 NC TECH Awards program. JupiterOne is a fin
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b
Last week, we published an article on a recent Chrome zero-day exploit (worth reading if you want see the history of the issue). There was a new announcement this
- CAASM
In this panel originally recorded for CyberSecurity Summit 2021 in Charlotte, speakers from JupiterOne, Gigamon, Duo Security, Sonatype, Vectra and Center for
- CSPM
- CAASM
Cyber criminals have upped their game in the past two years to take advantage of a world distracted in its battles with a global pandemic. Cybercrime is growing conti
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation
On Monday, September 13, Travis CI put out a security bulletin obliquely mentioning a security problem. “As a reminder from the Support Team, cycling your secrets is
The team at JupiterOne was well underway building version 2.0 of our Compliance App when I joined the company this summer. The primary motivation for the work on 2.0
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation
We are honored to receive this significant industry recognition as the 2021 SINET 16 Innovators Award winner. We know that the market competition is fierce, so we
If you recently read about the breaking fix JupiterOne introduced to maintain J1QL language correctness as defined by De Morgan's Law you may have found yourself in
The cloud is becoming increasingly popular. It is the driving force of the modern world, and engineers are starting to shift their careers accordingly. Whatever your
- CAASM
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation
Beyond the classic Cloud Security Posture Management (CSPM) tools like Dome9, DivvyCloud, etc. now even infrastructure and workload scanners claim CSPM as part of the
- CAASM
- CSPM
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation
We are excited to announce that JupiterOne has been selected as a Winner in the WorldFestival 2021 Innovation Awards in the Cloud Computing category! We are extremely
AWS S3 has long become a standard for storing file object data. Despite the many efforts in making S3 secure, we continue to see data in private buckets exposed or ex
- CAASM
Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation
Guest author Chris Hughes, CISO and Co-Founder of Aquia, offers a view of the "Shared Responsibility Model".
- CSPM
This week JupiterOne launched Query Anywhere. As you might guess, this feature will allow J1 users to access the core 'search for anything' functionality of J1QL no
A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talking about. Everyday
- CAASM
- SecOps
We are starting to make waves in the cybersecurity universe. Turns out, people love us and we are crushing this awards season (like Bong Joon-Ho's Parasite).
- CAASM
- GRC
- SecOps
If you only read the first two sentences of this blog, this should be your takeaway: Policy as Code provides a roadmap to verify the processes in security and govern
- GRC
- SecOps
We just received the awesome news that JupiterOne Founder and Chief Executive Erkang Zheng has been selected as one of The Top 25 Cybersecurity CEOs of 2021 by
Anyone reading this article already understands the importance of Data Classification. Increased regulation has been a by-product of greater understanding of the dang
- CAASM
- IAM
Today, we are proud to announce two additional strategic investors, Cisco Investments and Splunk Ventures, to the JupiterOne journey. This announcement reflects our
Azure role-based access control (RBAC) allows for expressive access policies through the use of Azure role assignments. Azure role assignments are nodes that link
- CSPM
Cloud adoption, digital transformation, and API-first architecture are fundamentally changing how we build, manage and secure the enterprise. Enterprises use speciali
- CAASM
There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we
- CSPM
- CAASM
I’m old. When I began my career, IT asset management (ITAM) meant going around, from computer to computer, and putting stickers with barcodes and numbers on every
- CAASM
Today’s episode begins with Seba Deleersnyder, project lead for the Software Assurance Maturity Model, or SAMM. The mission of this OWASP Flagship Project is to
- CAASM
- SecOps
Before I became a Security Engineer at JupiterOne, I was the sole security automation and cloud compliance engineer at LifeOmic. We built the JupiterOne platform to
In this panel originally recorded for CyberSecurity Summit 2021 in Silicon Valley, speakers from JupiterOne, axiad, Duo Security, Gigamon, Recorded Future, and
- CAASM
"What did you do this weekend"? It's a typical question that gets asked a million times a day, around the world, every Monday. We posed the question to our team a
This is part of an ongoing podcast series, highlighting the OWASP Flagship Projects that will be featured at the OWASP 20th Anniversary Celebration in September.
- CAASM
- SecOps
"Security engineering is the process of incorporating security controls into the information system so that they become an integral part of the system's operational
- CAASM
- SecOps
In security, when you think of the term 'asset', where does your head go? Chances are, you're thinking of employee laptops and bare-metal servers on-premise or in
- CAASM
- IAM
- CSPM
Caroline Wong and I recently had a call to discuss something that’s been bothering me for years… how do we assess financial risk before a data breach happens. How do
- CAASM
- SecOps
In this panel originally recorded for CyberSecurity Summit 2021 in Dallas, speakers from JupiterOne, Cobalt, Code42, Netenrich, Securonix, Spirion, and Venafi discuss
- CAASM
In this panel originally recorded for CyberSecurity Summit 2021 in Nashville, speakers from JupiterOne, Code42, Venafi, and Abnormal Security discuss the various fact
- CAASM
When I was in middle school, my science teacher, Mr. B., introduced me to the original Star Trek series. And it had me shook. Ever since, the series has been my stand
- CAASM
For Star Wars fans, May the 4th is a very special day. We get to make all sorts of silly puns, memes, and jokes based on our love of a series of movies.
I was watching the movie Heat today. For those of you that don’t know anything about the movie, it’s an amazing cops and robbers story featuring an all star cast that
- CAASM
JupiterOne CEO Erkang Zheng has traveled the journey of a healthtech CISO with 20+ years of cybersecurity experience. In this fireside chat delivered at HealthConDX
- GRC
Over the past year, I thoroughly enjoyed my time at YL Ventures as their CISO-in-Residence, meeting brilliant entrepreneurs and brainstorming creative approaches for
In 2020, Security Magazine listed Sounil Yu as one of the most Influential People in Security, in part because of his work on the Cyber Defense Matrix, a framework
- CAASM
Cloud technology saved many businesses from catastrophe during this past year, but it's also introduced additional challenges to security, compliance, and governance
- CSPM
I rode my bicycle across the United States in 1996 (Everett, Washington to Washington DC), and up into Nova Scotia. That summer I logged over 4400 miles on my bike.
- CAASM
"The future of application development and infrastructure is in public clouds — and for many organizations, it's not just the future; it's today. Securing data, apps,
- CAASM
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.