Hire ethical hackers to check your online systems for vulnerabilities.

You think your company is not a target for hackers?

It probably is!

Criminals are targeting organisations of all sorts and sizes to steal information, disrupt operations, or extort money.

That’s why our ethical hackers use the same tools and tricks to test your IT infrastructure as the bad guys do, hopefully before the bad guys do…

Toreon’s Ivan Roels explains what a pentest is on Kanaal Z (Dutch)

Fill in our contact form and get in touch with our Ethical Hackers

2 + 2 = ?

Do you want to know more about what exactly a pentest is and what you can get checked?

Read a blog

, ,

Belgian Cyber Security Challenge CTF: A Junior’s View

The Belgian Cyber Security Challenge is a Capture-The-Flag game that’s focused on cybersecurity. The event is organised by Toreon’s friends NVISO. Timeline: Wednesday 10 am started my team’s 32 hour adventure; capturing as many flags as we could possibly find. 10:30 am: first blood! After half an hour we already found a first flag that placed us…

, ,

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time with the mingling of IT staff in the OT/ICS environments; the so-called IT-OT Convergence. My personal opinion is that the involvement of the IT people in OT environments is a…

, , ,

Using ‘Embrace Cybersecurity’ to check on security progress

In a previous blog posts (Business and IT aligned with Cybersecurity and Baselining Cybersecurity), I introduced our ‘Embrace Cybersecurity’ (EC) model for gathering security requirements that can be used to create an information security policy. Using this method makes it easy to then also follow up on progress. We can do this by creating the…