Application Security coaching

The Cyber Resilience Act: what it means for your company

The CRA promotes innovation and cybersecurity in European digital products. Learn how your company can comply with applicable standards.

Adapting risk calculation to your needs

The core idea behind risk calculation is that it should allow an organization to score different elements in an objective, repeatable manner. However, these parameters…

Examining attack tree tools, how do they compare?

In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?

How to protect your organization from application consent attacks

Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.

How to implement application risk profiling

In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.

Implementing security requirements to ‘shift left’ and create ‘secure by design’ software

In this blog, we take a look at why good security requirements are important and how these should be constructed.

We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

Start typing and press Enter to search

Shopping Cart