Toreon News

Threat Modeling Insider – December 2025

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Threat Modeling & Embedded Systems

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Designing Cyber Governance: Board Structures and Practices for Effective Oversight

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Toreon geselecteerd als VLAIO-partner

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Threat Modeling Insider – October 2025

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Threat Modeling: Expanding scope to the software supply chain

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Threat Modeling Insider – September 2025

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Threat Modeling and Threat Intelligence: Distinct and Complementary

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Voka Webinar – Toreon: AI & CyberSecurity

Ontdek hoe jouw onderneming zijn AI-strategie kan redden. Uw concurrenten gebruiken al AI. Uw medewerkers ook – of u het nu weet of niet. Maar…

CVE-2025-9709: New CVE documents major vulnerability in common chip

This is the latest of such publications and the contribution by one of the researchers in our network: CVE-2025-9709, which discusses discovered vulnerabilities in a…

Start typing and press Enter to search

Shopping Cart