Tech Security

Scale, Flow and Security

February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?

Software Developers and Security Tools

October 10, 2023
Stepping back and thinking about application security as a developer, and reflecting on the where it makes sense to focus on people or tools.

Start Here: Business Continuity

Business continuity concerns your ability to keep your business running in the event of a disaster, malicious attack on your […]

Start Here: System Security

System security concerns the security steps you take to ensure your servers and resources are safe from downtime, interference, or […]

Start Here: Application Security

Application security (AppSec) concerns the security measures built into applications. The aim is to  prevent data or code being stolen […]

Start Here: Network Security

Network security concerns the protection of your computer network and its data. Your network includes interconnected devices like laptops, servers, […]

How To Buy A Pentest and Get The Most Out Of It

How to make sure you get your money's worth for a penetration test - what to ask for, how to tell a great vendor from a scan factory.

Feature Spotlight: Network Scanning

This post is a feature spotlight on the network scanning.

Automated Mass Spearsmishing

This post provides a quick view into a smishing campaign we have observed at several customers, with detail from our direct experience.

Maintaining Business Continuity in the Face of a Cyber-Attack

Molson Coors suffered a cyber-attack on March 11, 2021, that disrupted "its brewery operations, production, and shipments." By early April, the company […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram