News and articles

TMI newsletter 13 – Threat modeling: what are we modeling, exactly?

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

Will distributed electricity production increase cybersecurity risks?

Will we be more or less resilient to cyberattacks with distributed production facilities?

Toreon nominated as Trends Gazelle

Toreon is honored to be nominated as a ‘Trends Gazelle’ in the province of Antwerp. This is a credit to our team which pulled together and kept spirits…

Two trends with regards to the risk of electricity supply failures

We all take our uninterrupted, constantly on-demand supply of energy for granted so easily, but sometimes forget the underlying infrastructure

We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

Toreon Cybersecurity Debate

Join our panel on security as an enabler of digital growth on November 25th

TMI newsletter 12 – Keys to successful privacy threat modeling

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization…

Patch management for ICS

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

TMI newsletter 11 Threat Modeling Definition of Done

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

The Fog of More

How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while…

Fluvius

Toreon simply manages to put the right expert in the right place

Privacy Shield no longer valid. These are the alternatives.

Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…

Increasing cybersecurity threats 

Black hat hackers have become increasingly professional in recent years

Heilig Hart Lier

A strong focus on security, the staff’s unique expertise, and a down-to-earth approach: that’s what makes Toreon stand out!

Board members, demand your spiderweb chart!

Board members are not cybersecurity experts, so how do you keep track of the cybersecurity posture of your organization, without…

Develop a clear security vision and plan (webinar)

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

9 security questions a director should ask management

Many of these questions reflect back on the principles from the ECODA guidebook: having a solid risk management program, access…

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap