Cloud security compliance

The Importance of Cloud Security: A Comprehensive Guide for CISOs

As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…

Lessons from Microsoft’s Azure App Misconfiguration

Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.

Protecting the front door to your Microsoft cloud environment

As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…

The benefits of a continuous assessment mindset of your cybersecurity posture

In this blog, we cover continuous assessment and the benefits that it brings to the table.

Toreon first in Belgium to achieve Advanced Specialization in Information Protection

Microsoft has recognized our level of expertise and awarded us this new level of partnership.

We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…

7 tools to secure your Microsoft network for free

The rules are getting increasingly strict – look at the GDPR – and attackers are becoming ever more inventive. Luckily, an acceptable level of protection…

Start typing and press Enter to search

Shopping Cart