CISO

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

The Truth About Audits

Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

Feature Spotlight: Network Scanning

This post is a feature spotlight on the securityprogram.io network scanning.

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Feature Spotlight: Vendor Tracking

This post is a feature spotlight on the securityprogram.io vendor tracker.

Securing Tech Workers in Ukraine

February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.

Feature Spotlight: Risk Register

This post is a feature spotlight on the securityprogram.io risk register.

Automated Mass Spearsmishing

This post provides a quick view into a smishing campaign we have observed at several customers, with detail from our direct experience.

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram