Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
The CRA promotes innovation and cybersecurity in European digital products. Learn how your company can comply with applicable standards.
The core idea behind risk calculation is that it should allow an organization to score different elements in an objective, repeatable manner. However, these parameters…
In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?
Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
Discover the top 4 cybersecurity challenges we frequently see pop up.
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.