Learning from IndyCar Racing

April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?

Is TikTok A National Security Threat?

April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?
Illustration of two people shaking hands in front of an image of business document.

Building Trust and Boosting Sales: How implementing a trust center on your website can elevate your brand

January 25, 2024
Learn how implementing a Trust Center on your website can reduce security questionnaires, boost sales, and increase trust with your customers.

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

Key Considerations When Completing Security Questionnaires

September 1, 2023
Receiving a security questionnaire can be overwhelming. Keeping these important points in mind will keep you on the path to successful business partnerships.

OWASP Top 10 Lists

August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.

Hierarchy of Security Needs - Part 2

February 28, 2023
In our first post on this topic, we introduced the Hierarchy of Security Needs and tied it to psychology and […]

Hierarchy of Security Needs - Part 1

December 4, 2022
Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.

Clear Security Hurdles and Win Deals

September 12, 2022
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.
1 2 3

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram