Explore Layered Threat Modeling by Michael Boeynaems and a Data Flow Diagram template for Miro from Sebastien Deleersnyder in this edition of the Threat Modeling…
Enhance your threat modeling with Miro’s Data Flow Diagram Template. Create representations of your systems with trust boundaries to visualize your data flows and strengthen…
In this issue, we feature a guest article by John Bun offering a step-by-step approach to improving digital safety, and much more!
Learn how to align your cloud strategy with NIS2 and future regulations. Explore key compliance steps, risk management, and security tools to ensure long-term data…
Toreon Launches Threat Modeling Certification Program in Partnership with IriusRisk
Our threat modeling experts, Sebastien Deleersnyder and Steven Wierckx, share their experience attending two significant events in the U.S.: the OWASP Global AppSec 2024 and…
This packed edition features a guest article by Ben Ramirez on Threat Modeling for Retrieval-Augmented Generation (RAG) AI Applications.
The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
This months Threat Modeling Insider edition features a blog on the friction often encountered during DevSecOps adoption and highlights how Threat Modeling can be the…
Our ‘CISO Insider’ newsletter is rebranding to ‘Security Leader Insider’ to better reflect our evolving audience and the broader scope of the content we provide.