We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Join our panel on security as an enabler of digital growth on November 25th
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…