Search for:
Search Button
ABOUT
Resources
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
CLOSE
LOGIN
Menu
Application Security
Penetration Testing
security
program.io
Features
Pricing
CLOSE
Search for:
Search Button
GETTING STARTED
Security 101
Standards
Data Security
Data Classification & Privacy
Identity and Access
Tech Security
Application Security
Business Continuity
Network Security
Penetration Testing
Systems Security
Physical Security
Asset Management
Physical Security
Business Security
Incident Response
Risk Management
Vendor Management
Topics
Tech Deep Dive
In the News
Matt's Take
Glossary
Matt's Take
Philosophy
Technology and Security: AI, Cloud, IoT
October 9, 2018
It’s a Trap! Avoiding the Security Budget Trap.
August 28, 2018
Security in the SDLC (Reboot)
June 7, 2018
Using the OWASP Top 10 Properly
March 7, 2018
Commercial Software Using Open Source
February 1, 2018
Tend Your Digital Garden
January 25, 2018
Your Vulnerability Spreadsheet Says More Than You Think
January 9, 2018
Thinking About Secrets
October 19, 2017
Popular Media Coverage of Software and Formal Methods
October 15, 2017
Security Policies Rebooted
August 15, 2017
« Previous
1
2
3
Next »
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a conversation
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
close
Menu
close
Menu
close
Menu
close
© 2019-2023 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram