Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Blog
Sharing Files with S3 Safely
March 15, 2019
It seems to me like back in the day, all the companies we worked with shared files with FTP. Remember […]
Managing Dependencies
February 20, 2019
A common question came up again this week working with a developer (and friend) at a partner that does custom […]
Oops! A discussion about priorities and risk
February 5, 2019
This post is about a case where we didn’t follow our own advice or industry best practices and it bit […]
A Trello Template for AppSec Program Projects
January 30, 2019
Last week I wrote about application security programs What is a program and why do we need it? After writing […]
Implementing Authorization Properly
January 16, 2019
Almost every time we do a penetration test or code review, we find problems with authorization. Sometimes we call these horizontal […]
Don’t rely on X-XSS-Protection to protect you from XSS
November 28, 2018
The X-XSS-Protection header only helps protect against certain reflected XSS attacks. It does nothing for stored XSS attacks. Don’t rely […]
Live Coding a Glue Task at AppSecUSA – Video
October 29, 2018
Here is the video from the Glue and live coding talk at AppSecUSA.
Live Coding a New Glue Task at AppSecUSA
October 18, 2018
At AppSecUSA, OWASP Glue, a project we contribute heavily to, was asked to present in the project showcase. I put […]
How it Works: TOTP Based MFA
October 11, 2018
Multi-Factor Authentication has become a requirement for any application that values security. In fact, it has become a regulatory requirement […]
Technology and Security: AI, Cloud, IoT
October 9, 2018
So … someone asked me the following question, so I figured I’d put my answer in a blog post. In […]
« Previous
1
…
4
5
6
7
8
9
Next »
Popular Tags
CISO
,
security culture
,
cybersecurity
,
application security
,
devops
,
features
,
Real World
,
Security questionnaires
,
AI Security
,
NIST 800-53
,
iso 27001
,
cybsersecurity
,
trust
,
Saas
,
security compliance
,
soc 2
,
pentesting
,
remote work
,
Security questionnaire
,
data security
,
cmmc
,
sales
,
security posture
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy