Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
application security
Learning from IndyCar Racing
April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?
Is TikTok A National Security Threat?
April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?
Scale, Flow and Security
February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?
Software Developers and Security Tools
October 10, 2023
Stepping back and thinking about application security as a developer, and reflecting on the where it makes sense to focus on people or tools.
OWASP Top 10 Lists
August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.
ChatGPT and Security
August 22, 2023
Lots of people want to know about the security implications of ChatGPT. Well, this post delivers that!
Feature Spotlight: Network Scanning
This post is a feature spotlight on the securityprogram.io network scanning.
Feature Spotlight: Vendor Tracking
This post is a feature spotlight on the securityprogram.io vendor tracker.
Pipeline Security Automation
This post talks about how we approach security automation in BitBucket Pipelines. It also introduces some new open source tools we […]
How to Improve the Security of Your Applications: A Starting Point
When we implement security programs, we often advise clients to build an inventory of their applications. There are a lot […]
Popular Tags
CISO
,
cybersecurity
,
application security
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy