Wouter Avondstondt

How Threat Modeling improves Pentesting
In this article we will cover how Threat Modeling improves Pentesting. It is the fourth article in a series about Threat Modeling. Read previous articles…
The Cybersecurity Booster Shot

Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.

Threat Modeling vs. Pentesting

This article explains the difference between Threat Modeling and Penetration Testing. It is the third article in a series about Threat Modeling.

9 benefits of Threat Modeling

9 benefits of Threat Modeling is the second post in a series to educate those who are interested in a first experience with Threat Modeling

What is Threat Modeling?

This post – What is Threat Modeling? – is the first in a series to educate those who are interested in a first experience with…

Toreon first in Belgium to achieve Advanced Specialization in Information Protection

Microsoft has recognized our level of expertise and awarded us this new level of partnership.

Toreon nominated as Trends Gazelle

Toreon is honored to be nominated as a ‘Trends Gazelle’ in the province of Antwerp. This is a credit to our team which pulled together and kept spirits high during a challenging year. 

Board members, demand your spiderweb chart!

Board members are not cybersecurity experts, so how do you keep track of the cybersecurity posture of your organization, without going into the bits and…

9 security questions a director should ask management

Many of these questions reflect back on the principles from the ECODA guidebook: having a solid risk management program, access to security expertise, mitigation of…

Start typing and press Enter to search

Shopping Cart