Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures
In the fifth episode of The Wide Open, we welcome two experts, Jasper Hooft and Thomas Dejagere, who delve deeper into the NIS2 Directive within…
The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…
This blog will help you with navigating the first 3 months as a new CISO through 5 steps
Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.
Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.
The benefits of obtaining an ISO27001 certificate are starting to appeal more and more for companies. Find out how Toreon can help you obtain it.