Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Blog
Validating Search Engine Indexers
October 1, 2018
Not all bots are created equal. Some bots are good, some bots are bad, and some bots are not what […]
It’s a Trap! Avoiding the Security Budget Trap.
August 28, 2018
It’s a trap. You know it’s a trap. But you don’t know how to avoid the trap. It is budget […]
CSRF Tokens with Restful API’s
August 27, 2018
Our team was recently working on a test where we noticed that the application, which was a Single Page App […]
Security in the SDLC (Reboot)
June 7, 2018
Today I was looking back for my blog posts about security in the SDLC from 2012-2016 and I realized that […]
Dependency Management for Developers
March 20, 2018
I recently got asked about best practices for dependency management by an old colleague. In response, I wrote the following […]
Using the OWASP Top 10 Properly
March 7, 2018
I have gone to great lengths to strictly separate my OWASP activities from my Jemurai activities in an effort to […]
Commercial Software Using Open Source
February 1, 2018
Here’s an interesting slightly different spin on the otherwise tired “Open Source” vs. “Closed Source” being more secure debate! The […]
Tend Your Digital Garden
January 25, 2018
Something that is really hard about application security is that it isn’t something you can just point a tool at […]
Turns Out Policy in Markdown in Github Works!
January 12, 2018
I’ve seen policies from lots of companies big and small. Generally, I’m a techie engineer so I don’t love policy. […]
Your Vulnerability Spreadsheet Says More Than You Think
January 9, 2018
More often than I’d care to say, I work on projects where a client has a vulnerability spreadsheet to rule […]
« Previous
1
…
5
6
7
8
9
Next »
Popular Tags
CISO
,
security culture
,
cybersecurity
,
application security
,
devops
,
features
,
Real World
,
Security questionnaires
,
AI Security
,
NIST 800-53
,
iso 27001
,
cybsersecurity
,
trust
,
Saas
,
security compliance
,
soc 2
,
pentesting
,
remote work
,
Security questionnaire
,
data security
,
cmmc
,
sales
,
security posture
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy