News and articles

Develop a clear security vision and plan (webinar)

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Cybersecurity for Corporate Boards

5 principles to help board members get a grasp on cybersecurity or at least be able to talk about cybersecurity…

TMI newsletter 9 How often do living documents need to breathe?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly…

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The…

FDA recommends Threat Modeling as Cybersecurity Risk Assessment methodology

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be…

Get the basics right! – 5 cybersecurity essentials

We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity…

7 advantages of penetration testing

Time to take a closer look at the 7 benefits pentests have for your company.

The importance of information security for SMEs

Today, it is also unthinkable for SMEs to function without information technology or access to the Internet, let alone remain…

The NIST Cybersecurity Framework: what it is and why you should use it

The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the…

The increasing importance of ISO 27001 certification

Both GDPR and NIS indicate that ISO 27001 certification is more important than ever.Toreon assists several organisations getting ISO 27001…

7 tools to secure your Microsoft network for free

Cybersecurity is a hot topic. The rules are getting increasingly strict – look at the GDPR – and attackers are…

The 6 top cybersecurity risks in the healthcare sector

The digitization within the healthcare sector is going very fast. The development of electronic patient records (EPD), sensor and tracking…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling…

5 tips for safe teleworking

More and more Belgian workers are now working from home to slow down the spread of the coronavirus. That is…

7 ways to create trust by implementing the GDPR

The GDPR brings many challenges, but it is also an opportunity to create and leverage customer trust. When people trust…

Cybersecurity is still too often overlooked in business strategy

Apart from knowledge of GDPR, no BEL20 board member has a clear background in information and cybersecurity. This can be…

Threat Modeling in an ICS environment

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected…

Yes, you can protect your company against ransomware

Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately,…

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap