Toreon News

Break-Glass Access done right: Why YubiKeys are essential for secure emergency access

Break-Glass Access done right: Why YubiKeys are essential for secure emergency access Microsoft allows customers with complex environments or technical barriers to postpone the enforcement…

Unlock 50% Subsidies for Cybersecurity – And Still Get a Solution That Fits You

Unlock 50% Subsidies for Cybersecurity – And Still Get a Solution That Fits You Are you an SME in Flanders looking to boost your cybersecurity…

Threat Modeling Insider – February 2026

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

The Hidden Risk in Your Security Design: Managing Unknowns and Assumptions in Threat Modeling

The Hidden Risk in Your Security Design: Managing Unknowns and Assumptions in Threat Modeling In the world of cybersecurity, what you know can protect you, but what…

Secure-by-Design in the AI Age: From Risk Identification to Ongoing Control

Secure-by-Design in the AI Age: From Risk Identification to Ongoing Control AI breaks “classic” secure-by-design: risks keep shifting after deployment due to updates, reuse, and…

2026: The Year Cyber Compliance Becomes Mandatory

2026: The Year Cyber Compliance Becomes Mandatory For many Belgian organizations, 2026 is the year where cybersecurity compliance moves from “important topic” to “non‑negotiable business…

Grid Congestion, Risk Assessment, and Resilience: Why Governance Matters

Artes Group, a multi-disciplinary construction consortium, partnered with Toreon to strengthen its cybersecurity by conducting a red team engagement. Seeking deeper insight than traditional audits…

Threat Modeling Insider – January 2026

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Artes Group strengthens security posture through red teaming with Toreon

Artes Group, a multi-disciplinary construction consortium, partnered with Toreon to strengthen its cybersecurity by conducting a red team engagement. Seeking deeper insight than traditional audits…

Why Thinking Like a Defender Beats the Attacker Mindset

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Start typing and press Enter to search

Shopping Cart