Hire ethical hackers to check your online systems for vulnerabilities.

You think your company is not a target for hackers?

It probably is!

Criminals are targeting organisations of all sorts and sizes to steal information, disrupt operations, or extort money.

That’s why our ethical hackers use the same tools and tricks to test your IT infrastructure as the bad guys do, hopefully before the bad guys do…

Toreon’s Ivan Roels explains what a pentest is on Kanaal Z (Dutch)

Fill in our contact form and get in touch with our Ethical Hackers

0 + 8 = ?

Do you want to know more about what exactly a pentest is and what you can get checked?

Read a blog

,

Het belang van informatiebeveiliging voor KMO’s

Dit is de eerste blog van een reeks blogs met als focus ‘informatiebeveiliging bij KMO’s’. In deze blogs leggen we stapsgewijs uit hoe KMO’s de beveiliging van hun informatie kunnen optimaliseren. Deze eerste blog kadert alvast het belang van informatiebeveiliging bij KMO’s. In de opvolgblogs gaan we dieper in op de aanpak. Het is vandaag…

, ,

OWASP BeNeLux Days 2018

I love working with OWASP because I strongly believe in the values of knowledge sharing and community building. I personally started the OWASP Belgium chapter in Belgium in 2005. Today, I am also very active as co-leader on the OWASP SAMM project. When I started my company Toreon (cyber security consulting), I tried to instil the same values…

,

Belgian Cyber Security Challenge CTF: A Junior’s View

The Belgian Cyber Security Challenge is a Capture-The-Flag game that’s focused on cybersecurity. The event is organised by Toreon’s friends NVISO. Timeline: Wednesday 10 am started my team’s 32 hour adventure; capturing as many flags as we could possibly find. 10:30 am: first blood! After half an hour we already found a first flag that placed us…