Blog

Epic Security Failure and Risk

December 17, 2020
All I could do was facepalm after somebody pointed me to an article about how Microsoft unleashed a death star […]

Risk and Threat Modeling with Mind Maps

November 10, 2020
In security we talk a lot about understanding risk. That informs the advice we give and decisions we make. A […]

Lets Talk About Blockchain

October 28, 2020
Let’s talk about Blockchain. I think many people in the security world are already appropriately skeptical of all of the […]

Crush Github Action

October 20, 2020
Everyone is talking about pushing left. I feel like I’ve been talking about Agile Security since like 2010. Whatever we’re […]

Your First Security Hire

June 11, 2020
We often talk with companies that are thinking about hiring an FTE to help them with security. This post covers […]

App Meta Security Information

May 7, 2020
When we implement security programs, we often advise clients to build an inventory of their applications. There are a lot […]

Zoom Security Reality Check

April 10, 2020
Zoom has been in the news a lot lately. In this post, we try to put the Zoom security situation […]

Secure Remote Work

March 13, 2020
In light of Coronavirus / Covid-19 and in particular, the key CDC recommendation that we implement social distancing (work from […]
remote-work

How to Stay Secure While Working Remotely

March 12, 2020
In light of Coronavirus / Covid-19 and in particular, the key CDC recommendation that we implement social distancing (work from home), we wanted to try to […]

Dependency Management — A nightmare scenario

January 27, 2020
Dependency management has become a very important part of insuring the security of your applications. We’ve written about it many […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram