This article explains the difference between Threat Modeling and Penetration Testing. It is the third article in a series about Threat Modeling.
The benefits of obtaining an ISO27001 certificate are starting to appeal more and more for companies. Find out how Toreon can help you obtain it.
The latest Threat Modeling Insider features a guest article on possible cases for a post-risk cyber world.
When the air becomes the attack surface: CVE-2026-6058 and a lesson in threat modeling By Georges Bolssens When we think about “validating untrusted input”, we…
Break-Glass Access done right: Why YubiKeys are essential for secure emergency access Microsoft allows customers with complex environments or technical barriers to postpone the enforcement…
Unlock 50% Subsidies for Cybersecurity – And Still Get a Solution That Fits You Are you an SME in Flanders looking to boost your cybersecurity…
The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.
The Hidden Risk in Your Security Design: Managing Unknowns and Assumptions in Threat Modeling In the world of cybersecurity, what you know can protect you, but what…
Secure-by-Design in the AI Age: From Risk Identification to Ongoing Control AI breaks “classic” secure-by-design: risks keep shifting after deployment due to updates, reuse, and…


