Follow a day in the life of Cedric Foccaert, as he balances tasks like developing SME solutions and preparing clients for ISO27001 audits.
This is the story of how I found a remote code execution vulnerability CVE-2024-2912, in BentoML and what it can teach you about securing your…
The latest Threat Modeling Insider features a guest article based on a conversation between Dinis Cruz and Sebastien Deleersnyder
Discover our Top 10 Threat Modeling Tips, featuring impactful insights and resources that resonate with our Threat Modeling Insider readers.
Follow a day in the life of Eric De Smedt, a GRC expert, as he manages client projects, internal tasks, and continuous learning in Governance,…
We’re kicking off 2025 with a bang! In our guest article, Jeroen Verwoest explains how you can enhance your penetration tests using threat modeling techniques.
We’re excited to announce the fourth edition of our Cyber Café, an evening filled with cybersecurity insights!
Discover how risk patterns streamline threat modeling, cut exposure, and boost security. Learn proven strategies and see how to take action today.
Explore Layered Threat Modeling by Michael Boeynaems and a Data Flow Diagram template for Miro from Sebastien Deleersnyder in this edition of the Threat Modeling…
Enhance your threat modeling with Miro’s Data Flow Diagram Template. Create representations of your systems with trust boundaries to visualize your data flows and strengthen…