Login

Archives

SSRF in Real Life
Now that Server-Side Request Forgery (SSRF) has finally made it onto the OWASP Top 10 you may find yourself wondering whether this is really something you should be worrying about in your apps, or if it's more of an abstract risk that's not really exploitable in the wild. Let me confirm your fears: ...
Read More
Planning for Escalated Hacking
This post provides answers to the question of what should we do about the escalated tensions and risk of cybersecurity conflict....
Read More
Your First Security Hire
We often talk with companies that are thinking about hiring an FTE to help them with security. This post covers some of our thoughts and experiences in this area. As with many areas of security, there is no one size fits all approach that works here, but there are some pitfalls and ways to make [&he...
Read More
Feature Spotlight: Network Scanning
This post is a feature spotlight on the securityprogram.io network scanning....
Read More
Feature Spotlight: Policies
This post is a feature spotlight on the securityprogram.io policies....
Read More
Feature Spotlight: Vendor Tracking
This post is a feature spotlight on the securityprogram.io vendor tracker....
Read More
Feature Spotlight: Training
This post is a feature spotlight on the securityprogram.io training....
Read More
Securing Tech Workers in Ukraine
This post provides some quick insights into the things you may need to do to protect your outsourced tech workers in conflict zones like Ukraine....
Read More
Feature Spotlight: Risk Register
This post is a feature spotlight on the securityprogram.io risk register....
Read More
Automated Mass Spearsmishing
This post provides a quick view into a smishing campaign we have observed at several customers, with detail from our direct experience....
Read More
Which Security Standard Should I Use?
One of the big questions we get is "which standard should we use?"  Or "which security certification should we get?"  Oh and what is a SOC 2 Type 2 anyway??? Although securityprogram.io is neutral to which standard you use, we have seen customers mature through different levels of security...
Read More
1 2 3 4

Deliver security your clients can trust

Excellent security for small companies to build a standards and audit ready cybersecurity program.
© 2019-2022 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram