Sebastien Deleersnyder

TMI newsletter 9 How often do living documents need to breathe?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

FDA recommends Threat Modeling as Cybersecurity Risk Assessment methodology

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be applied in your field.

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

5 tips for safe teleworking

More and more Belgian workers are now working from home to slow down the spread of the coronavirus. That is why it is important that…

Cybersecurity is still too often overlooked in business strategy

Apart from knowledge of GDPR, no BEL20 board member has a clear background in information and cybersecurity. This can be seen in a profile analysis…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

Threat modeling: what is it, how does it work and why is it so important?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

TMI newsletter 10 Scaling Up Threat Modeling

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

TMI newsletter 8 (19-Dec-2019)

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

TMI newsletter 7 (10-Oct-2019)

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

Start typing and press Enter to search

Shopping Cart