Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is the primary security analysis task executed during the software design stage. Threat modeling in 4 steps. Discover more.
In a bid to bolster the cybersecurity of critical infrastructure organizations across Europe, the European Commission is rolling out a new initiative under the NIS2…
This edition focuses on demystifying the NIS2 directive, with a guest article by Taco Mulder and our latest The Wide Open podcast, featuring Jasper Hooft…
This months Threat Modeling Insider edition features a chance to win a ticket to ThreatModCon in Lisbon!
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy
Vincent Haerinck documented a typical day in his professional life at Toreon.
Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures
This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy