Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Blog
Hierarchy of Security Needs - Part 1
December 4, 2022
Do you remember Maslow's Hierarchy of needs? How humans need food and water before they can start thinking about self actualization? This post talks about the first level in a theoretical security hierarchy of needs.
Clear Security Hurdles and Win Deals
September 12, 2022
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out.
AppSec - Zero Trust in Zero Trust
The other day we were giving developers security training around server side request forgery (SSRF). We see this all of […]
Discovering A Competitor's Internal Data Online!
August 16, 2022
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits.
Phishing Job Candidates
July 29, 2022
This post provides a view into a phishing campaign that targeted job candidates at a customer.
SSRF in Real Life
Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering […]
Supporting Remote Work Securely
March 16, 2022
On Friday we wrote a blog post that talked about remote work and security from a workers perspective. We included […]
Planning for Escalated Hacking
March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.
Securing Tech Workers in Ukraine
February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.
Log4J Security Issue
This post is a quick summary around the Log4J security issues happening in December 2021. It includes a summary, a […]
« Previous
1
2
3
4
…
8
Next »
Popular Tags
CISO
,
security culture
,
cybersecurity
,
application security
,
devops
,
features
,
Real World
,
Security questionnaires
,
AI Security
,
NIST 800-53
,
iso 27001
,
cybsersecurity
,
trust
,
Saas
,
security compliance
,
soc 2
,
pentesting
,
remote work
,
Security questionnaire
,
data security
,
cmmc
,
sales
,
security posture
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram