5 Quick Wins to Improve Your Security Posture Instantly

May 26, 2021
Because of their size, small companies are especially vulnerable to cyber-attacks. Bad actors looking for quick wins are playing the […]

Email from a Security Researcher

February 23, 2021
Yesterday, for the Nth time, a client had a “security researcher” send an email about a “high-impact” security vulnerability. I’ve […]

Your First Security Hire

June 11, 2020
We often talk with companies that are thinking about hiring an FTE to help them with security. This post covers […]


March 29, 2019
At Jemurai, we do a lot of custom projects building and breaking things and helping teams build more secure code. […]

Oops! A discussion about priorities and risk

February 5, 2019
This post is about a case where we didn’t follow our own advice or industry best practices and it bit […]

Technology and Security: AI, Cloud, IoT

October 9, 2018
So … someone asked me the following question, so I figured I’d put my answer in a blog post. In […]

It’s a Trap! Avoiding the Security Budget Trap.

August 28, 2018
It’s a trap.  You know it’s a trap.  But you don’t know how to avoid the trap. It is budget […]

Security in the SDLC (Reboot)

June 7, 2018
Today I was looking back for my blog posts about security in the SDLC from 2012-2016 and I realized that […]

Using the OWASP Top 10 Properly

March 7, 2018
I have gone to great lengths to strictly separate my OWASP activities from my Jemurai activities in an effort to […]

Commercial Software Using Open Source

February 1, 2018
Here’s an interesting slightly different spin on the otherwise tired “Open Source” vs. “Closed Source” being more secure debate! The […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram