SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

Key Considerations When Completing Security Questionnaires

September 1, 2023
Receiving a security questionnaire can be overwhelming. Keeping these important points in mind will keep you on the path to successful business partnerships.

OWASP Top 10 Lists

August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.

Hierarchy of Security Needs - Part 2

February 28, 2023
In our first post on this topic, we introduced the Hierarchy of Security Needs and tied it to psychology and […]

Hierarchy of Security Needs - Part 1

December 4, 2022
Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.

Clear Security Hurdles and Win Deals

September 12, 2022
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.

Your Next(or First) Security Hire Should Be...

July 27, 2021
For years, a common rule-of-thumb said your security spending should be around 10% of your company’s IT budget—but that rule […]
security culture

Creating a Security Culture

June 10, 2021
Protecting your company requires a robust security program with documented policies and processes; but without consistent, thorough execution of those […]

5 Quick Wins to Improve Your Security Posture Instantly

May 26, 2021
Because of their size, small companies are especially vulnerable to cyber-attacks. Bad actors looking for quick wins are playing the […]

Email from a Security Researcher

February 23, 2021
Yesterday, for the Nth time, a client had a “security researcher” send an email about a “high-impact” security vulnerability. I’ve […]
1 2 3

Popular Tags

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2019-2023 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram