News and articles

Patch management for ICS

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

TMI newsletter 11 Threat Modeling Definition of Done

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

The Fog of More

How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while…

Fluvius

Toreon simply manages to put the right expert in the right place

Privacy Shield no longer valid. These are the alternatives.

Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…

Increasing cybersecurity threats 

Black hat hackers have become increasingly professional in recent years

Heilig Hart Lier

A strong focus on security, the staff’s unique expertise, and a down-to-earth approach: that’s what makes Toreon stand out!

Board members, demand your spiderweb chart!

Board members are not cybersecurity experts, so how do you keep track of the cybersecurity posture of your organization, without…

Develop a clear security vision and plan (webinar)

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

9 security questions a director should ask management

Many of these questions reflect back on the principles from the ECODA guidebook: having a solid risk management program, access…

The age of digital transformation

Creating a culture of innovation and awareness, in which employees can challenge the status quo while being adequately aware of…

NMBS-SNCB

A strong focus on security, the staff’s unique expertise, and a down-to-earth approach: that’s what makes Toreon stand out!

Security Rating Services, an essential tool for IT risk management

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Niko

Toreon and Niko’s development teams blended their expertise in IoT security.

Cybersecurity for Corporate Boards

5 principles to help board members get a grasp on cybersecurity or at least be able to talk about cybersecurity…

TMI newsletter 10 Scaling Up Threat Modeling

In this months newsletter: A guest article by Mikko Saario, Tip of the month, Curated resources covering threat modeling machine…

Implementing remote working in ICS environments

In today’s society it’s become common practice to work and follow up business from home or a remote location. The…

FDA recommends Threat Modeling as Cybersecurity Risk Assessment methodology

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be…

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap