Hierarchy of Security Needs - Part 2

February 28, 2023
In our first post on this topic, we introduced the Hierarchy of Security Needs and tied it to psychology and […]

Acknowledging Carri Craver

February 28, 2023
I never thought about writing a post like this, but I can't think of much else to do in this […]

Hierarchy of Security Needs - Part 1

December 4, 2022
Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.

Clear Security Hurdles and Win Deals

September 12, 2022
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.

AppSec - Zero Trust in Zero Trust

The other day we were giving developers security training around server side request forgery (SSRF). We see this all of […]
Shows example attack surface

Discovering A Competitor's Internal Data Online!

August 16, 2022
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

SSRF in Real Life

Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering […]

Supporting Remote Work Securely

March 16, 2022
On Friday we wrote a blog post that talked about remote work and security from a workers perspective. We included […]

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram