Not rendering correctly? View this email as a web page here.

Mission Control Newsletter

January was one helluva year month, right?

Change is constant. Complexity is increasing. And the threats aren’t slowing down.

Of the security operations center (SOC) professionals that were recently surveyed by the Ponemon Institute, more than 80% of them rate their SOC’s complexity as very high, rising from 74% in 2019. The long hours and demands of the job can be emotionally stressful and draining – burnout is real. “Hope to cope” isn’t a viable long-term solution to deal with complexity or burnout.

SOCs aren’t one-size-fits all (and neither are socks).

So what can we do?

As SOC teams work more cross-functionally with infrastructure, operations, and DevOps teams, shared visibility and observability become critical in a shared responsibility model for cybersecurity. As Stuart Reed of Nominet says in this Dark Reading article, “Beyond Burnout: What Is Cybersecurity Doing to Us?

“Anyone that's dealing with data, anyone that's dealing with customer information, anyone who's processing data, anyone who's dealing with it, they will have responsibility for it.”

It’s time to break down relational barriers and make it more intuitive for cross-functional teams to join the cybersecurity crusade. In the same way that Bruce from Finding Nemo says, “Fish are friends, not food,” here’s our security rendition of that statement:

Security folks are friends, not snoots.

‘Til next time,

The JupiterOne Team

blog-continuous-improvement-cloud-security-newsletter

3 Steps for Continuous Improvement in Cloud Security

Wouldn't auto-discovery of all cyber assets make your life easier? Take a look at these three steps to continuously improve your cloud security posture.
 

New Ponemon Research - The Economics of SOC

Learn more about the growing challenges, rising costs, and increased complexity for security operations centers in this report, sponsored by Fireeye.
 
ponemon-1
PPT-Podcast-Logo

The Ops Side of DevSecOps with Damon Edwards

Check out this episode of the People, Process, Technology podcast to hear how operations can stay relevant as the third part of DevSecOps.
 

Internal S3 Buckets Exposed via Public EC2 Instances

This approach to accessing an S3 bucket was responsible for one of the major data breaches at an international financial organization. Apply this query to your environment to see if you’re also at risk.
 
j1ql-spotlight
dr-logo

The Data-Centric Path to Zero Trust

One of the pros for a data-centric approach is that it abstracts the complexity out and puts it into a policy enforcement engine, which gives organizations the assurance they need in real time. Read the article to learn more about this approach to zero trust.
 

JupiterOne, Inc.

1500 Perimeter Park Drive Suite 310 Morrisville NC 27560

Preferences | Unsubscribe