Software development: A few focus points For the second episode of our in-house podcast ʽThe Wide Open’, Siebe De Roovere welcomes Steven Wierckx, Application Security…
In our May edition of the TMI newsletter we show off The AI Attack Surface Map, a resource for thinking about the various attack surfaces…
In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…
Cloud security & compliance to accelerate your growth Cloud computing has become an integral part of business today. In Toreon’s first in-house podcast, Siebe De…
In this edition, we get a take a look at the Developer-driven threat modeling at OutSystems
This blog will help you with navigating the first 3 months as a new CISO through 5 steps
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
In this edition, we get a deep dive into the 2023 Threat Modeling Connect Hackaton
Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.