Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
In the News
Learning from IndyCar Racing
April 25, 2024
Several drivers were disqualified from a car race because of illegal software modifications that gave them an unfair advantage. What can we learn?
Is TikTok A National Security Threat?
April 24, 2024
Is TikTok a national security threat? How should we be thinking about national security in a digital age of apps and data gathering?
SEC Charges CISO - What It Means
October 31, 2023
I was a little surprised to see the SolarWinds CISO charged by the SEC. This post talks about why.
Legislating Software Security
March 2, 2023
Today when I sat down to work, I had a number of questions sitting in Twitter and Slack about a […]
Supporting Remote Work Securely
March 16, 2022
On Friday we wrote a blog post that talked about remote work and security from a workers perspective. We included […]
Planning for Escalated Hacking
March 1, 2022
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict.
Securing Tech Workers in Ukraine
February 18, 2022
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine.
Ransomware Attacks and Small Businesses
July 1, 2021
Ransomware attacks are big news right now. According to US Secretary of Homeland Security Alejandro Mayorkas, ransomware attacks are up a […]
Epic Security Failure and Risk
December 17, 2020
All I could do was facepalm after somebody pointed me to an article about how Microsoft unleashed a death star […]
Lets Talk About Blockchain
October 28, 2020
Let’s talk about Blockchain. I think many people in the security world are already appropriately skeptical of all of the […]
1
2
Next »
Popular Tags
CISO
,
cybersecurity
,
application security
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy