CISO

The Truth About Audits

Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

Feature Spotlight: Network Scanning

This post is a feature spotlight on the securityprogram.io network scanning.

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Feature Spotlight: Vendor Tracking

This post is a feature spotlight on the securityprogram.io vendor tracker.

Securing Tech Workers in Ukraine

February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.

Feature Spotlight: Risk Register

This post is a feature spotlight on the securityprogram.io risk register.

Automated Mass Spearsmishing

This post provides a quick view into a smishing campaign we have observed at several customers, with detail from our direct experience.

Your Next(or First) Security Hire Should Be...

July 27, 2021
For years, a common rule-of-thumb said your security spending should be around 10% of your company’s IT budget—but that rule […]

Answering Security Questionnaires

Do you have customers that are asking you to fill out security questionnaires as part of their "due diligence" process?  Does […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2019-2023 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram