Blog

Sharing Files with S3 Safely

March 15, 2019
It seems to me like back in the day, all the companies we worked with shared files with FTP. Remember […]

Managing Dependencies

February 20, 2019
A common question came up again this week working with a developer (and friend) at a partner that does custom […]

Oops! A discussion about priorities and risk

February 5, 2019
This post is about a case where we didn’t follow our own advice or industry best practices and it bit […]

A Trello Template for AppSec Program Projects

January 30, 2019
Last week I wrote about application security programs What is a program and why do we need it? After writing […]

Implementing Authorization Properly

January 16, 2019
Almost every time we do a penetration test or code review, we find problems with authorization.  Sometimes we call these horizontal […]

Don’t rely on X-XSS-Protection to protect you from XSS

November 28, 2018
The X-XSS-Protection header only helps protect against certain reflected XSS attacks. It does nothing for stored XSS attacks. Don’t rely […]

Live Coding a Glue Task at AppSecUSA – Video

October 29, 2018
Here is the video from the Glue and live coding talk at AppSecUSA.

Live Coding a New Glue Task at AppSecUSA

October 18, 2018
At AppSecUSA, OWASP Glue, a project we contribute heavily to, was asked to present in the project showcase.  I put […]

How it Works: TOTP Based MFA

October 11, 2018
Multi-Factor Authentication has become a requirement for any application that values security. In fact, it has become a regulatory requirement […]

Technology and Security: AI, Cloud, IoT

October 9, 2018
So … someone asked me the following question, so I figured I’d put my answer in a blog post. In […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram