application security

Learning from IndyCar Racing

April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?

Is TikTok A National Security Threat?

April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

Software Developers and Security Tools

October 10, 2023
Stepping back and thinking about application security as a developer, and reflecting on the where it makes sense to focus on people or tools.

OWASP Top 10 Lists

August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.

ChatGPT and Security

August 22, 2023
Lots of people want to know about the security implications of ChatGPT. Well, this post delivers that!

Feature Spotlight: Network Scanning

This post is a feature spotlight on the securityprogram.io network scanning.

Feature Spotlight: Vendor Tracking

This post is a feature spotlight on the securityprogram.io vendor tracker.

Pipeline Security Automation

This post talks about how we approach security automation in BitBucket Pipelines. It also introduces some new open source tools we […]

How to Improve the Security of Your Applications: A Starting Point

When we implement security programs, we often advise clients to build an inventory of their applications. There are a lot […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram