Blog

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

SSRF in Real Life

Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering […]

Supporting Remote Work Securely

March 16, 2022
On Friday we wrote a blog post that talked about remote work and security from a workers perspective. We included […]

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Securing Tech Workers in Ukraine

February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.

Log4J Security Issue

This post is a quick summary around the Log4J security issues happening in December 2021. It includes a summary, a […]

Pipeline Security Automation

This post talks about how we approach security automation in BitBucket Pipelines. It also introduces some new open source tools […]

Pipeline Security Automation

This post talks about how we approach security automation in BitBucket Pipelines. It also introduces some new open source tools we […]

Your Next(or First) Security Hire Should Be...

July 27, 2021
For years, a common rule-of-thumb said your security spending should be around 10% of your company’s IT budget—but that rule […]

Ransomware Attacks and Small Businesses

July 1, 2021
Ransomware attacks are big news right now. According to US Secretary of Homeland Security Alejandro Mayorkas, ransomware attacks are up a […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2019-2023 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram