Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
GETTING STARTED
Security 101
Standards
Data Security
Data Classification & Privacy
Identity and Access
Tech Security
Application Security
Business Continuity
Network Security
Penetration Testing
Systems Security
Physical Security
Asset Management
Physical Security
Business Security
Incident Response
Risk Management
Vendor Management
Glossary
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Blog
Scale, Flow and Security
February 13, 2024
How does flow, scale and micro-service architecture apply to implementing security in high functioning organizations?
Building Trust and Boosting Sales: How implementing a trust center on your website can elevate your brand
January 25, 2024
Learn how implementing a Trust Center on your website can reduce security questionnaires, boost sales, and increase trust with your customers.
SEC Charges CISO - What It Means
October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.
Software Developers and Security Tools
October 10, 2023
Stepping back and thinking about application security as a developer, and reflecting on the where it makes sense to focus on people or tools.
Key Considerations When Completing Security Questionnaires
September 1, 2023
Receiving a security questionnaire can be overwhelming. Keeping these important points in mind will keep you on the path to successful business partnerships.
OWASP Top 10 Lists
August 25, 2023
Although the OWASP Top 10 Lists are great, more consideration needs to be put into the developer consuming the list.
ChatGPT and Security
August 22, 2023
Lots of people want to know about the security implications of ChatGPT. Well, this post delivers that!
Legislating Software Security
March 2, 2023
Today when I sat down to work, I had a number of questions sitting in Twitter and Slack about a […]
Hierarchy of Security Needs - Part 2
February 28, 2023
In our first post on this topic, we introduced the Hierarchy of Security Needs and tied it to psychology and […]
Acknowledging Carri Craver
February 28, 2023
I never thought about writing a post like this, but I can't think of much else to do in this […]
1
2
3
…
8
Next »
Popular Tags
CISO
,
cybersecurity
,
application security
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram