Blog

Validating Search Engine Indexers

October 1, 2018
Not all bots are created equal. Some bots are good, some bots are bad, and some bots are not what […]

It’s a Trap! Avoiding the Security Budget Trap.

August 28, 2018
It’s a trap.  You know it’s a trap.  But you don’t know how to avoid the trap. It is budget […]

CSRF Tokens with Restful API’s

August 27, 2018
Our team was recently working on a test where we noticed that the application, which was a Single Page App […]

Security in the SDLC (Reboot)

June 7, 2018
Today I was looking back for my blog posts about security in the SDLC from 2012-2016 and I realized that […]

Dependency Management for Developers

March 20, 2018
I recently got asked about best practices for dependency management by an old colleague.  In response, I wrote the following […]

Using the OWASP Top 10 Properly

March 7, 2018
I have gone to great lengths to strictly separate my OWASP activities from my Jemurai activities in an effort to […]

Commercial Software Using Open Source

February 1, 2018
Here’s an interesting slightly different spin on the otherwise tired “Open Source” vs. “Closed Source” being more secure debate! The […]

Tend Your Digital Garden

January 25, 2018
Something that is really hard about application security is that it isn’t something you can just point a tool at […]

Turns Out Policy in Markdown in Github Works!

January 12, 2018
I’ve seen policies from lots of companies big and small.  Generally, I’m a techie engineer so I don’t love policy.  […]

Your Vulnerability Spreadsheet Says More Than You Think

January 9, 2018
More often than I’d care to say, I work on projects where a client has a vulnerability spreadsheet to rule […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram