Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…
Toreon and two other Flemish technology and services companies and three research groups have started working on the APAX project.
Check out our guest article by Jeevan Saini and a Toreon blog post covering 7 key learning principles to create our future threat modeling training
As of April 12, Alex Driesen will become the new CEO of Toreon.
Check out our guest article by Koen Yskout and a Toreon blog post covering 7 key learning principles to create our future threat modeling training
Discover a guest article by Kim Wuyts covering “Keys to successful privacy threat modeling” and an update on our Threat Modeling Playbook.
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…
In this months newsletter: A guest article by Mikko Saario, Tip of the month, Curated resources covering threat modeling machine learning, A white paper on…