Search for:
Search Button
ABOUT
Resources
Blog
Glossary
Resource Library
Security 101
About
About Us
Origin Story
Careers
Contact
Contact Us
Request a Proposal
Schedule a Conversation
security
program.io
Features
Pricing
Login to SPIO
CLOSE
Services
Application Security
Penetration Testing
Security Questionnaires
CLOSE
Search for:
Search Button
BLOG
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
Philosophy
Using the OWASP Top 10 Properly
March 7, 2018
I have gone to great lengths to strictly separate my OWASP activities from my Jemurai activities in an effort to […]
Commercial Software Using Open Source
February 1, 2018
Here’s an interesting slightly different spin on the otherwise tired “Open Source” vs. “Closed Source” being more secure debate! The […]
Tend Your Digital Garden
January 25, 2018
Something that is really hard about application security is that it isn’t something you can just point a tool at […]
Your Vulnerability Spreadsheet Says More Than You Think
January 9, 2018
More often than I’d care to say, I work on projects where a client has a vulnerability spreadsheet to rule […]
Thinking About Secrets
October 19, 2017
Introduction We have two types of projects that often uncover secrets being shared in ways that aren’t well thought through. […]
Popular Media Coverage of Software and Formal Methods
October 15, 2017
It is interesting … in the wake of Equifax and other recent news, The Atlantic has published several articles about […]
Security Policies Rebooted
August 15, 2017
Here’s a deep dark secret: I don’t particularly like security policy. I don’t always follow policy. Goodness knows that with […]
Incubator: Canary Data
August 7, 2017
Incubator At Jemurai, we have started incubating products. We love security consulting and the engineering we do there, but there […]
Signal, Audit and Logging – Introduction
July 6, 2017
At clients, we work to make sure the best information is available to: Debug an application Track what happens in […]
The 10 OWASP Commandments
May 15, 2017
Here at Jemurai, we have at least a few Hamilton fans. OK, I might be the biggest … but I’m definitely […]
« Previous
1
2
3
Popular Tags
CISO
,
security culture
,
cybersecurity
,
application security
,
devops
,
features
,
Real World
,
Security questionnaires
,
AI Security
,
NIST 800-53
,
iso 27001
,
cybsersecurity
,
trust
,
Saas
,
security compliance
,
soc 2
,
pentesting
,
remote work
,
Security questionnaire
,
data security
,
cmmc
,
sales
,
security posture
Popular Posts
Ready to get started?
Build a comprehensive security program using our proven model.
Schedule a meeting
Request a proposal
(214) 613-3167
info@jemurai.com
Visit our Twitter
Visit our LinkedIn
Visit our YouTube channel
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
Menu
In the News
Matt's Take
Philosophy
Tactics
Tech Deep Dive
close
Menu
close
© 2012-2024 Jemurai. All rights reserved.
search
envelope-o
close
arrow-circle-o-down
chevron-right
chevron-down
phone
caret-down
ellipsis-v
linkedin
facebook
pinterest
youtube
rss
twitter
instagram
facebook-blank
rss-blank
linkedin-blank
pinterest
youtube
twitter
instagram
We use cookies to ensure that we give you the best experience on our website. By clicking "ok" you are consenting to our use of cookies.
Ok
No
Privacy policy