The latest Threat Modeling Insider features a guest article on how security champions drive threat modeling at scale by Stanley Harris.
Toreon opens an office in Louvain-La-Neuve.
In this issue, we feature a guest article by Nathalie Claes, showcasing that cybersecurity starts with you, not just IT.
This is the story of how Robbe discovered CVE-2024-28088, a URI traversal vulnerability in LangChain’s configuration loading mechanism that led to full API token leakage,…
Learn how to align your ISO 27001 ISMS with EU DORA requirements. Explore key differences, additional deliverables, and practical steps for financial sector compliance in…
Get leadership buy-in for threat modeling with five proven strategies. Learn how to frame risk, show ROI, and use social proof to champion change.
The latest Threat Modeling Insider features a guest article on the Four Principles to Accelerate Security at Scale by Dave Soldera.
Looking for the right threat modeling training? Here’s how to choose a practical, impactful course your team will actually use.
Discover how threat modeling can be a strategic approach to comply with the CRA while ensuring security by design across the product lifecycle.
The latest Threat Modeling Insider features a guest article on PLOT4AI 2.0 written by Isabel Barberá