News and articles

How to protect your organization from application consent attacks

Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we…

How to implement application risk profiling

In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.

Implementing security requirements to ‘shift left’ and create ‘secure by design’ software

In this blog, we take a look at why good security requirements are important and how these should be constructed.

Taking a glimpse at the ISO 21434 standard

Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.

TMI newsletter 16 – We need an army of threat modelers

This edition contains various fields in which Threat Modeling can play a significant role: MDR, AI/ML, Automation, Pentesting and User…

Even the largest game development studios are a target

Even the largest game development studios are not spared from cyber attacks as Ubisoft was recently hacked. 

TMI newsletter 15 – Threat Modeling Benefits Everyone

Check out our guest article written by Ken Van Wyck on how Threat Modeling can benefit everyone in the Dev…

4 Insights on the impact of the conflict in Ukraine on cyber threats in Belgium

Many organizations are worried about the cyber security implications for their own security of the war in Ukraine and if…

How Threat Modeling improves Pentesting
In this article we will cover how Threat Modeling improves Pentesting. It is the fourth article in a series about…
Toreon once again nominated as Trends Gazellen

Toreon is honored to once again be nominated as a ‘Trends Gazelle’ in the province of Antwerp. 

50 Critical questions to ask about digitalization

IT and digitalization needs to become a bigger priority for boards. These 50 critical questions prove why.

The Cybersecurity Booster Shot

Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.

New cybersecurity project to decrease online vulnerability

Toreon and two other Flemish technology and services companies and three research groups have started working on the APAX project.

Threat Modeling vs. Pentesting

This article explains the difference between Threat Modeling and Penetration Testing. It is the third article in a series about…

TMI newsletter 14 – Threat Modeling Redefined: The Self-Serve Threat Model

Check out our guest article by Jeevan Saini and a Toreon blog post covering 7 key learning principles to create…

9 benefits of Threat Modeling

9 benefits of Threat Modeling is the second post in a series to educate those who are interested in a…

23/10/21 – Day of the Cybersecurity Consultant

Revisit a fantastic day filled with free training from top experts in their fields!

21-22/10/21 Toreon @ Energy Mission

Toreon is joining Energy mission at Thor Central as a bronze sponsor!

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap