Application Security coaching

Threat Modeling

Will we be more or less resilient to cyberattacks with distributed production facilities?

OWASP SAMM Road Map

Will we be more or less resilient to cyberattacks with distributed production facilities?

We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…

The 6 top cybersecurity risks in the healthcare sector

The digitization within the healthcare sector is going very fast. The development of electronic patient records (EPD), sensor and tracking technology for the follow-up of…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

Toreon presents Threat Modeling workshop at SecAppDev 2019

At SecAppDev our CEO Sebastien Deleersnyder proposes an action-packed 1 day Threat Modeling workshop.

Start typing and press Enter to search

Shopping Cart