Login

Archives

SSRF in Real Life
Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering whether this is really something you should be worrying about in your apps, or if it's more of an abstract risk that's not really exploitable in the wild. Let me confirm your fears: ...
Read More
Clear Security Hurdles and Win Deals
Are you a tech leader that gets pulled in to help sales with security questions? This post talks about how we see that play out....
Read More
Discovering A Competitor's Internal Data Online!
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits....
Read More
The Truth About Audits
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits....
Read More
Phishing Job Candidates
This post provides a view into a phishing campaign that targeted job candidates at a customer....
Read More
Feature Spotlight: Network Scanning
This post is a feature spotlight on the securityprogram.io network scanning....
Read More
Feature Spotlight: Policies
This post is a feature spotlight on the securityprogram.io policies....
Read More
Planning for Escalated Hacking
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict....
Read More
Feature Spotlight: Vendor Tracking
This post is a feature spotlight on the securityprogram.io vendor tracker....
Read More
Feature Spotlight: Training
This post is a feature spotlight on the securityprogram.io training....
Read More
1 2 3 4

Deliver security your clients can trust

Excellent security for small companies to build a standards and audit ready cybersecurity program.
© 2019-2022 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram