CISO

Learning from IndyCar Racing

April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?

Is TikTok A National Security Threat?

April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

The Truth About Audits

Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.

Phishing Job Candidates

July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.

Feature Spotlight: Network Scanning

This post is a feature spotlight on the securityprogram.io network scanning.

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Feature Spotlight: Vendor Tracking

This post is a feature spotlight on the securityprogram.io vendor tracker.

Securing Tech Workers in Ukraine

February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram