We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be applied in your field.
More and more Belgian workers are now working from home to slow down the spread of the coronavirus. That is why it is important that…
Apart from knowledge of GDPR, no BEL20 board member has a clear background in information and cybersecurity. This can be seen in a profile analysis…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
In this months newsletter: A guest article by Izar “Infosec Curmudgeon” Tarandach, Curated resources covering an awesome list of threat modeling resources.
In this months newsletter: A guest article by Chris Romeo covering “Threat modeling: better caught than taught”
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…