The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…

Threat modeling in 4 steps

Threat modeling is the primary security analysis task executed during the software design stage. Threat modeling in 4 steps. Discover more.

Toreon partner of CYSSDE: New cybersecurity consortium to fund penetration testing across the EU

In a bid to bolster the cybersecurity of critical infrastructure organizations across Europe, the European Commission is rolling out a new initiative under the NIS2…

CISO Insider – June 2024

This edition focuses on demystifying the NIS2 directive, with a guest article by Taco Mulder and our latest The Wide Open podcast, featuring Jasper Hooft…

Threat Modeling Insider – May 2024

This months Threat Modeling Insider edition features a chance to win a ticket to ThreatModCon in Lisbon!

Threat Modeling Playbook – Part 5 Innovate with threat model technology

In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy

Vincent Haerinck – Day In The Life

Vincent Haerinck documented a typical day in his professional life at Toreon.

4/06/2024 – Toreon Webinar: How to prepare for the NIS2 Directive

Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures​

Threat Modeling Insider – April 2024

This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats

Threat Modeling Playbook – Part 4 Strengthen your threat model processes

In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy

Start typing and press Enter to search

Shopping Cart