LOGIN

Blog

Hierarchy of Security Needs - Part 1 Read More
December 4, 2022 -

Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.

Read More
How To Buy A Pentest and Get The Most Out Of It Read More
September 28, 2022 -

How to make sure you get your money's worth for a penetration test - what to ask for, how to tell a great vendor from a scan factory.

Read More
Clear Security Hurdles and Win Deals Read More
September 12, 2022 -

Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.

Read More
AppSec - Zero Trust in Zero Trust Read More
August 30, 2022 -

The other day we were giving developers security training around server side request forgery (SSRF). We see this all of the time now (see this great and detailed post by our team on SSRF in Real Life). It can be shockingly damaging. In any case, during the training the developers brought up a very interesting […]

Read More
Discovering A Competitor's Internal Data Online! Read More
August 16, 2022 -

Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Read More
The Truth About Audits Read More
August 8, 2022 -

Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Read More
Phishing Job Candidates Read More
July 29, 2022 -

This post provides a view into a phishing campaign that targeted job candidates at a customer.

Read More
Feature Spotlight: Network Scanning Read More
May 9, 2022 -

This post is a feature spotlight on the securityprogram.io network scanning.

Read More
SSRF in Real Life Read More
April 8, 2022 -

Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering whether this is really something you should be worrying about in your apps, or if it's more of an abstract risk that's not really exploitable in the wild. Let me confirm your fears: It is […]

Read More
Supporting Remote Work Securely Read More
March 16, 2022 -

On Friday we wrote a blog post that talked about remote work and security from a workers perspective. We included a checklist. In this post, we want to develop that idea and talk about it more generally from a company and IT strategy perspective. We’ll start with some pictures to illustrate some of the issues. […]

Read More
Menu
Menu
© 2019-2023 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram