Login

Archives

SSRF in Real Life
Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering whether this is really something you should be worrying about in your apps, or if it's more of an abstract risk that's not really exploitable in the wild. Let me confirm your fears: ...
Read More
The Truth About Audits
Ever wonder about the effectiveness of audits? This post talks about the good, bad and ugly side of cybersecurity audits....
Read More
Phishing Job Candidates
This post provides a view into a phishing campaign that targeted job candidates at a customer....
Read More
Feature Spotlight: Network Scanning
This post is a feature spotlight on the securityprogram.io network scanning....
Read More
Feature Spotlight: Policies
This post is a feature spotlight on the securityprogram.io policies....
Read More
Planning for Escalated Hacking
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict....
Read More
Feature Spotlight: Vendor Tracking
This post is a feature spotlight on the securityprogram.io vendor tracker....
Read More
Feature Spotlight: Training
This post is a feature spotlight on the securityprogram.io training....
Read More
Securing Tech Workers in Ukraine
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine....
Read More
Feature Spotlight: Risk Register
This post is a feature spotlight on the securityprogram.io risk register....
Read More
1 2 3 4

Deliver security your clients can trust

Excellent security for small companies to build a standards and audit ready cybersecurity program.
© 2019-2022 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram