Philosophy

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?
Illustration of two people shaking hands in front of an image of business document.

Building Trust and Boosting Sales: How implementing a trust center on your website can elevate your brand

January 25, 2024
Learn how implementing a Trust Center on your website can reduce security questionnaires, boost sales, and increase trust with your customers.

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

Key Considerations When Completing Security Questionnaires

September 1, 2023
Receiving a security questionnaire can be overwhelming. Keeping these important points in mind will keep you on the path to successful business partnerships.

OWASP Top 10 Lists

August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.

Hierarchy of Security Needs - Part 2

February 28, 2023
In our first post on this topic, we introduced the Hierarchy of Security Needs and tied it to psychology and […]

Hierarchy of Security Needs - Part 1

December 4, 2022
Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.

Clear Security Hurdles and Win Deals

September 12, 2022
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.

Your Next(or First) Security Hire Should Be...

July 27, 2021
For years, a common rule-of-thumb said your security spending should be around 10% of your company’s IT budget—but that rule […]
security culture

Creating a Security Culture

June 10, 2021
Protecting your company requires a robust security program with documented policies and processes; but without consistent, thorough execution of those […]
1 2 3

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram