Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Blog
Security Code Review Tool - CRUSH
January 15, 2020
We often do code review for companies. Code review is a great control whether or not you are running SAST […]
Clojure Security and Signal
November 27, 2019
As a developer focused consultancy, we thrive in situations where we work in new languages or try new or different […]
Ransomware 101
October 3, 2019
We’ve seen a number of small and larger companies in our network targeted by ransomware in recent weeks so it […]
Cloud Security In Real Life
September 19, 2019
We’re doing a fair number of cloud security assessments. This post will talk a bit about what we have found […]
Using Github Pull Request Templates and Checks to Implement Security Checklists
August 15, 2019
This blog post will show one way to build security checklists into your code review and pull request flows in […]
Ginkgo for BDD Infrastructure Security Testing
July 29, 2019
Recently I’ve been working on a series of unit tests in Ginkgo (a popular BDD testing framework for Golang) and […]
Encrypting Large Files
April 23, 2019
We have a client that is doing interesting data science that depends on processing very large files (100GB) that are […]
Package managers
April 17, 2019
Over the past few weeks we’ve been talking a lot internally at Jemurai about how package managers and the code […]
Announcing securityprogram.io
March 29, 2019
At Jemurai, we do a lot of custom projects building and breaking things and helping teams build more secure code. […]
Exploring CloudTrail
March 25, 2019
We had a customer ask us to dig for some indicators of compromise in their AWS account. We are already […]
« Previous
1
…
3
4
5
6
7
…
9
Next »
Popular Tags
CISO
,
security culture
,
cybersecurity
,
application security
,
devops
,
features
,
Real World
,
Security questionnaires
,
AI Security
,
NIST 800-53
,
iso 27001
,
cybsersecurity
,
trust
,
Saas
,
security compliance
,
soc 2
,
pentesting
,
remote work
,
Security questionnaire
,
data security
,
cmmc
,
sales
,
security posture
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy