Data Security

Start Here: Data Classification & Privacy

Data classification is the process of segmenting data into tiers with different levels of protection to ensure privacy is maintained. […]

Start Here: Identity and Access Management (IAM)

Identity and access management (IAM) ensures that only those with the correct digital identification are able to access systems and […]

Five Things You're Not Doing That Put Your Data at Risk

The gravest risk to your data is taking an ad hoc approach to security instead of implementing a carefully thought-out […]

User Auditing with GAA

If you read the story about Samsung exposing SmartThings and AWS keys in code, which I came across through a […]

Impersonation Failures

Several times in the last few weeks we have looked at applications that have significant issues with “impersonation” features.  What […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram