Matt's Take

Learning from IndyCar Racing

April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?

Is TikTok A National Security Threat?

April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

Software Developers and Security Tools

October 10, 2023
Stepping back and thinking about application security as a developer, and reflecting on the where it makes sense to focus on people or tools.

OWASP Top 10 Lists

August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.

ChatGPT and Security

August 22, 2023
Lots of people want to know about the security implications of ChatGPT. Well, this post delivers that!

Acknowledging Carri Craver

February 28, 2023
I never thought about writing a post like this, but I can't think of much else to do in this […]
Shows example attack surface

Discovering A Competitor's Internal Data Online!

August 16, 2022
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram