Kim Verbruggen

Niko

Toreon’s one-on-one approach and their ability to oversee the implementation & certification process from start to finish is what made the collaboration between Tobania and…

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The flexibility which some employees have…

Tobania

Toreon’s one-on-one approach and their ability to oversee the implementation & certification process from start to finish is what made the collaboration between Tobania and…

The NIST Cybersecurity Framework: what it is and why you should use it

The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…

Threat Modeling in an ICS environment

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

In the pocket

Toreon understands the development business and in terms of technical knowledge they are a lot more advanced. The Belgian digital product studio In The Pocket…

Emmaüs

Emmaüs’ ICT service guarantees the smooth operation and evolution of digitalisation in all its aspects for 24 healthcare facilities in the province of Antwerp.

How do you build a (modest) ICS testing & training lab?

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

Why hackers won’t save you (even) in 2020 (and what to do about it).
Why hackers won't save you (even) in 2020 (and what to do about it). The most important challenges for you at a glance. Official figures…

Start typing and press Enter to search

Shopping Cart