Mission Control Blog

Discover how to advance your security program with the latest content from our community.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Network Segmentation, Visibility and Third-Party Risk Assessment
November 10, 2021
Blog
Network Segmentation, Visibility and Third-Party Risk Assessment

When Colonial Pipeline CEO Joseph Blount testified before the US Congress, he revealed that the attack was completely avoidable; Blount admitted that Darkside gained

  • CAASM
  • SecOps
Steve King
Book Preview: Hardening the Value Stream by Bryan Finster
November 3, 2021
Blog
Book Preview: Hardening the Value Stream by Bryan Finster

On October 19, 2021, we published the book, "Modern Cybersecurity: Tales from the Near-Distant Future". This is an excerpt from one of the chapters.

  • SecOps
Bryan Finster
GitHub Secrets Management with JupiterOne
October 27, 2021
Blog
GitHub Secrets Management with JupiterOne

JupiterOne recently added support for ingesting GitHub Org, Repo, and Environment secrets.

  • CAASM
Erich Smith
Book Preview: Modern Cybersecurity, Preface
October 20, 2021
Blog
Book Preview: Modern Cybersecurity, Preface

On October 19, 2021, we published a book, "Modern Cybersecurity: Tales from the Near-Distant Future". Over the next few weeks, we'll be publishing excerpts from the

  • CSPM
  • CAASM
Erkang Zheng
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future
October 19, 2021
Blog
Book Release: Modern Cybersecurity - Tales from the Near-Distant Future

The speed of change and the tools of adversaries make it extremely hard to envision a long-term, executable vision for the future of security. However, without ponder

  • CAASM
Mark Miller
Our Company Retreat: Camp JupiterOne
October 18, 2021
Blog
Our Company Retreat: Camp JupiterOne

Team retreats are an excellent way to bring a company together. For a remote-first company like JupiterOne, I’d say they are essential. It is a great way to strengthe

Melissa Pereira
Google Cloud Storage Access Analysis
October 14, 2021
Blog
Google Cloud Platform (GCP) Storage Access Analysis

Identity and Access Management (IAM) for Google Cloud uses IAM Role Bindings, which link three constructs together

  • IAM
Michael Knoedel
How To Get Started With IT Security Policies and Procedures
October 13, 2021
Blog
How To Get Started With IT Security Policies and Procedures

You open your email and there it is. Finally, the company that you really wanted to work for has extended you an offer. You feel a rush of adrenaline as you open it

  • GRC
Jeffrey Lee
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup
October 12, 2021
Blog
Top 5 Lessons in Building and Scaling Cybersecurity at a Cloud-Native Startup

I’m the Director of Cybersecurity at Esper, a cloud-native startup that offers powerful cloud tooling for Android device deployment and application management at scal

  • GRC
Jasmine Henry
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper
October 5, 2021
Blog
JupiterOne Customer Q&A Spotlight Series: Jasmine Henry, Director of Cybersecurity at Esper

Our customers are at the core of everything we do at JupiterOne. And every security strategy and journey is different for every customer. JupiterOne is starting a mon

JupiterOne Team
Boardroom Conversations on Security: Part 7
October 4, 2021
Blog
Boardroom Conversations on Security: Part 7

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
JupiterOne is a Finalist for NC Tech Cybersecurity Award
September 29, 2021
Blog
JupiterOne is a Finalist for NC Tech Cybersecurity Award

We’re honored to share that JupiterOne has been recognized for its innovation, excellence, and growth as part of the 2021 NC TECH Awards program. JupiterOne is a fin

Melissa Pereira
Boardroom Conversations on Security: Part 6
September 27, 2021
Blog
Boardroom Conversations on Security: Part 6

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation b

Mark Miller
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected
September 27, 2021
Blog
J1 ​​Rapid Response: Another Google Chrome Zero-Day exploit and How to Determine if You're Affected

Last week, we published an article on a recent Chrome zero-day exploit (worth reading if you want see the history of the issue). There was a new announcement this

  • CAASM
Sounil Yu
Future of Cloud Security - Cyber Security Summit Charlotte
September 23, 2021
Blog
Future of Cloud Security - Cyber Security Summit Charlotte

In this panel originally recorded for CyberSecurity Summit 2021 in Charlotte, speakers from JupiterOne, Gigamon, Duo Security, Sonatype, Vectra and Center for

  • CSPM
  • CAASM
Akash Ganapathi
2 Attack Vectors are Forcing Changes in how to Secure Software
September 22, 2021
Blog
2 Attack Vectors are Forcing Changes in how to Secure Software

Cyber criminals have upped their game in the past two years to take advantage of a world distracted in its battles with a global pandemic. Cybercrime is growing conti

Hema Nair
Boardroom Conversations on Security: Part 5
September 20, 2021
Blog
Boardroom Conversations on Security: Part 5

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
J1  Rapid Response: Travis CI Flaw
September 17, 2021
Blog
J1  Rapid Response: Travis CI Flaw

On Monday, September 13, Travis CI put out a security bulletin obliquely mentioning a security problem. “As a reminder from the Support Team, cycling your secrets is

Austin Kelleher
Design Update: Compliance App 2.0
September 15, 2021
Blog
Design Update: Compliance App 2.0

The team at JupiterOne was well underway building version 2.0 of our Compliance App when I joined the company this summer. The primary motivation for the work on 2.0

Patrick Morgan
Boardroom Conversations on Security: Part 4
September 13, 2021
Blog
Boardroom Conversations on Security: Part 4

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
SINET 16 Awards Winner: JupiterOne
September 10, 2021
Blog
SINET 16 Awards Winner: JupiterOne

We are honored to receive this significant industry recognition as the 2021 SINET 16 Innovators Award winner. We know that the market competition is fierce, so we

JupiterOne Team
De Morgan's Law in JupiterOne
September 8, 2021
Blog
De Morgan's Law in JupiterOne

If you recently read about the breaking fix JupiterOne introduced to maintain J1QL language correctness as defined by De Morgan's Law you may have found yourself in

Tony Ramirez
The Absolute Minimum Every Developer Must Know about AWS Security
September 7, 2021
Blog
The Absolute Minimum Every Developer Must Know about AWS Security

The cloud is becoming increasingly popular. It is the driving force of the modern world, and engineers are starting to shift their careers accordingly. Whatever your

  • CAASM
Nishant Thorat
Boardroom Conversations on Security: Part 3
September 6, 2021
Blog
Boardroom Conversations on Security: Part 3

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
CAASM is the Future... CSPM is Dead
September 1, 2021
Blog
CAASM is the Future... CSPM is Dead

Beyond the classic Cloud Security Posture Management (CSPM) tools like Dome9, DivvyCloud, etc. now even infrastructure and workload scanners claim CSPM as part of the

  • CAASM
  • CSPM
Akash Ganapathi
Boardroom Conversations on Security: Part 2
August 30, 2021
Blog
Boardroom Conversations on Security: Part 2

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards
August 26, 2021
Blog
JupiterOne Named Winner in WorldFestival 2021 Innovation Awards

We are excited to announce that JupiterOne has been selected as a Winner in the WorldFestival 2021 Innovation Awards in the Cloud Computing category! We are extremely

JupiterOne Team
My Bucket, My Data! (or is it?)
August 24, 2021
Blog
My Bucket, My Data! (or is it?)

AWS S3 has long become a standard for storing file object data. Despite the many efforts in making S3 secure, we continue to see data in private buckets exposed or ex

  • CAASM
Erkang Zheng
Boardroom Conversations on Security: Part 1
August 23, 2021
Blog
Boardroom Conversations on Security: Part 1

Boardroom Conversations on Security is an ongoing series on how to discuss and present cyber security concerns to your board. It comes from an extended conversation

Mark Miller
Compliance is cumbersome, but cloud can help
August 18, 2021
Blog
Compliance is cumbersome, but cloud can help

Guest author Chris Hughes, CISO and Co-Founder of Aquia, offers a view of the "Shared Responsibility Model".

  • CSPM
Chris Hughes
JupiterOne Launches Query Anywhere
August 11, 2021
Blog
JupiterOne Launches Query Anywhere

This week JupiterOne launched Query Anywhere. As you might guess, this feature will allow J1 users to access the core 'search for anything' functionality of J1QL no

Chum Wongrassamee
Podcast: CYA - Cover Your Assets with Chris Roberts
August 9, 2021
Blog
Podcast: CYA - Cover Your Assets with Chris Roberts

A couple weeks ago I read an article by Chris Roberts. The headline screamed, “Security Solved!” Security solved? What the hell was he talking about. Everyday

  • CAASM
  • SecOps
Mark Miller
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards
August 5, 2021
Blog
JupiterOne Named Winner of Top 10 CISOs; Finalists in 'Baby Black Unicorn' and Top 10 Cyber Security Experts Awards

We are starting to make waves in the cybersecurity universe. Turns out, people love us and we are crushing this awards season (like Bong Joon-Ho's Parasite).

  • CAASM
  • GRC
  • SecOps
JupiterOne Team
Policy as Code: How We Do It
August 4, 2021
Blog
Policy as Code: How We Do It

If you only read the first two sentences of this blog, this should be your takeaway: Policy as Code provides a roadmap to verify the processes in security and govern

  • GRC
  • SecOps
Tony Ramirez
JupiterOne Founder Named Top 25 Cyber CEO of 2021
July 28, 2021
Blog
JupiterOne Founder Named Top 25 Cyber CEO of 2021

We just received the awesome news that JupiterOne Founder and Chief Executive Erkang Zheng has been selected as one of The Top 25 Cybersecurity CEOs of 2021 by

JupiterOne Team
Automating Data Classification with JupiterOne
July 28, 2021
Blog
Automating Data Classification with JupiterOne

Anyone reading this article already understands the importance of Data Classification. Increased regulation has been a by-product of greater understanding of the dang

  • CAASM
  • IAM
Akash Ganapathi
Cisco Investments and Splunk Ventures, New Strategic Investors
July 27, 2021
Blog
Cisco Investments and Splunk Ventures, New Strategic Investors

Today, we are proud to announce two additional strategic investors, Cisco Investments and Splunk Ventures, to the JupiterOne journey. This announcement reflects our

Erkang Zheng
Azure Access Review using Optional Traversals in JupiterOne
July 21, 2021
Blog
Azure Access Review using Optional Traversals in JupiterOne

Azure role-based access control (RBAC) allows for expressive access policies through the use of Azure role assignments. Azure role assignments are nodes that link

  • CSPM
Nick Dowmon
A Modern Definition for Cyber Assets
July 14, 2021
Blog
A Modern Definition for Cyber Assets

Cloud adoption, digital transformation, and API-first architecture are fundamentally changing how we build, manage and secure the enterprise. Enterprises use speciali

  • CAASM
Mark Miller
Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management
July 6, 2021
Blog
Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management

There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we

  • CSPM
  • CAASM
Tyler Shields
The Next Evolution of ITAM, Beyond CMDB and ITSM
June 23, 2021
Blog
The Next Evolution of ITAM, Beyond CMDB and ITSM

I’m old. When I began my career, IT asset management (ITAM) meant going around, from computer to computer, and putting stickers with barcodes and numbers on every

  • CAASM
Tyler Shields
Podcast:  OWASP Flagship Projects - Episode 02
June 16, 2021
Blog
Podcast:  OWASP Flagship Projects - Episode 02

Today’s episode begins with Seba Deleersnyder, project lead for the Software Assurance Maturity Model, or SAMM. The mission of this OWASP Flagship Project is to

  • CAASM
  • SecOps
Mark Miller
Solving for Endpoint Compliance in a Cloud-First Landscape | JupiterOne | Simplified Security Operations
June 14, 2021
Blog
Solving for Endpoint Compliance in a Cloud-First Landscape

Before I became a Security Engineer at JupiterOne, I was the sole security automation and cloud compliance engineer at LifeOmic. We built the JupiterOne platform to

Erich Smith
The Future of Cloud Security - Cybersecurity Summit Silicon Valley
June 9, 2021
Blog
The Future of Cloud Security - Cybersecurity Summit Silicon Valley

In this panel originally recorded for CyberSecurity Summit 2021 in Silicon Valley, speakers from JupiterOne, axiad, Duo Security, Gigamon, Recorded Future, and

  • CAASM
Tyler Shields
JupiterOne Cares: Serving our Local Communities
June 9, 2021
Blog
JupiterOne Cares: Serving our Local Communities

"What did you do this weekend"? It's a typical question that gets asked a million times a day, around the world, every Monday. We posed the question to our team a

JupiterOne Team
Podcast:  OWASP Flagship Projects - Episode 01
June 4, 2021
Blog
Podcast:  OWASP Flagship Projects - Episode 01

This is part of an ongoing podcast series, highlighting the OWASP Flagship Projects that will be featured at the OWASP 20th Anniversary Celebration in September.

  • CAASM
  • SecOps
Mark Miller
5 Factors to Building a Better Security Engineering Culture and Team
June 2, 2021
Blog
5 Factors to Building a Better Security Engineering Culture and Team

"Security engineering is the process of incorporating security controls into the information system so that they become an integral part of the system's operational

  • CAASM
  • SecOps
Sounil Yu
IAM, CSPM, VM, IR, Compliance... Oh My!
May 26, 2021
Blog
IAM, CSPM, VM, IR, Compliance... Oh My!

In security, when you think of the term 'asset', where does your head go? Chances are, you're thinking of employee laptops and bare-metal servers on-premise or in

  • CAASM
  • IAM
  • CSPM
George Tang
How to Measure the Cost of Risk
May 19, 2021
Blog
How to Measure the Cost of Risk

Caroline Wong and I recently had a call to discuss something that’s been bothering me for years… how do we assess financial risk before a data breach happens. How do

  • CAASM
  • SecOps
Mark Miller
Identifying & Avoiding Insider Threats - Cybersecurity Summit Dallas
May 13, 2021
Blog
Identifying & Avoiding Insider Threats - Cybersecurity Summit Dallas

In this panel originally recorded for CyberSecurity Summit 2021 in Dallas, speakers from JupiterOne, Cobalt, Code42, Netenrich, Securonix, Spirion, and Venafi discuss

  • CAASM
Tyler Shields
Identifying & Avoiding Insider Threats - Cybersecurity Summit Nashville
May 6, 2021
Blog
Identifying & Avoiding Insider Threats - Cybersecurity Summit Nashville

In this panel originally recorded for CyberSecurity Summit 2021 in Nashville, speakers from JupiterOne, Code42, Venafi, and Abnormal Security discuss the various fact

  • CAASM
Tyler Shields
How Cyber Assets Are Like Star Trek's Tribbles Problem
May 5, 2021
Blog
How Cyber Assets Are Like Star Trek's Tribbles Problem

When I was in middle school, my science teacher, Mr. B., introduced me to the original Star Trek series. And it had me shook. Ever since, the series has been my stand

  • CAASM
Jennie Duong
JupiterOne Raises $30 Million Series-B Led by Sapphire Ventures
May 4, 2021
Blog
JupiterOne Raises $30 Million Series-B Led by Sapphire Ventures

For Star Wars fans, May the 4th is a very special day. We get to make all sorts of silly puns, memes, and jokes based on our love of a series of movies.

Erkang Zheng
Map Your Cyber Relationship Graph Before Your Adversaries Do
April 28, 2021
Blog
Map Your Cyber Relationship Graph Before Your Adversaries Do

I was watching the movie Heat today. For those of you that don’t know anything about the movie, it’s an amazing cops and robbers story featuring an all star cast that

  • CAASM
Tyler Shields
Make Compliance = Real Security in HealthCare
April 22, 2021
Blog
Make Compliance = Real Security in HealthCare

JupiterOne CEO Erkang Zheng has traveled the journey of a healthtech CISO with 20+ years of cybersecurity experience. In this fireside chat delivered at HealthConDX

  • GRC
Erkang Zheng
I didn't want to be CISO - Sounil Yu joins JupiterOne
April 21, 2021
Blog
I didn't want to be a CISO - Sounil Yu joins JupiterOne

Over the past year, I thoroughly enjoyed my time at YL Ventures as their CISO-in-Residence, meeting brilliant entrepreneurs and brainstorming creative approaches for

Sounil Yu
Podcast: The Cyber Defense Matrix
April 21, 2021
Blog
Podcast: The Cyber Defense Matrix

In 2020, Security Magazine listed Sounil Yu as one of the most Influential People in Security, in part because of his work on the Cyber Defense Matrix, a framework

  • CAASM
Sounil Yu
Two Truths And A Lie About Cloud Security
April 8, 2021
Blog
Two Truths And A Lie About Cloud Security

Cloud technology saved many businesses from catastrophe during this past year, but it's also introduced additional challenges to security, compliance, and governance

  • CSPM
Ashleigh Lee
Stunt Kites and Security Tools
April 5, 2021
Blog
Stunt Kites and Security Tools

I rode my bicycle across the United States in 1996 (Everett, Washington to Washington DC), and up into Nova Scotia. That summer I logged over 4400 miles on my bike.

  • CAASM
Mark Miller
You Can Not Secure What You Can Not See
April 2, 2021
Blog
You Can Not Secure What You Can Not See

"The future of application development and infrastructure is in public clouds — and for many organizations, it's not just the future; it's today. Securing data, apps,

  • CAASM
Mark Miller
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.