Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.
Even the largest game development studios are not spared from cyber attacks as Ubisoft was recently hacked.
Many organizations are worried about the cyber security implications for their own security of the war in Ukraine and if and how they should boost…
Toreon is honored to once again be nominated as a ‘Trends Gazelle’ in the province of Antwerp.
IT and digitalization needs to become a bigger priority for boards. These 50 critical questions prove why.
Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.
Toreon and two other Flemish technology and services companies and three research groups have started working on the APAX project.