cybersecurity

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

SEC Charges CISO - What It Means

October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.

SSRF in Real Life

Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering […]

Planning for Escalated Hacking

March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.

Securing Tech Workers in Ukraine

February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.

Ransomware Attacks and Small Businesses

July 1, 2021
Ransomware attacks are big news right now. According to US Secretary of Homeland Security Alejandro Mayorkas, ransomware attacks are up a […]
security culture

Creating a Security Culture

June 10, 2021
Protecting your company requires a robust security program with documented policies and processes; but without consistent, thorough execution of those […]

How to Improve the Security of Your Applications: A Starting Point

When we implement security programs, we often advise clients to build an inventory of their applications. There are a lot […]
remote-work

How to Stay Secure While Working Remotely

March 12, 2020
In light of Coronavirus / Covid-19 and in particular, the key CDC recommendation that we implement social distancing (work from home), we wanted to try to […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram