Toreon Launches Threat Modeling Certification Program in Partnership with IriusRisk
Our threat modeling experts, Sebastien Deleersnyder and Steven Wierckx, share their experience attending two significant events in the U.S.: the OWASP Global AppSec 2024 and…
This packed edition features a guest article by Ben Ramirez on Threat Modeling for Retrieval-Augmented Generation (RAG) AI Applications.
The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
This months Threat Modeling Insider edition features a blog on the friction often encountered during DevSecOps adoption and highlights how Threat Modeling can be the…
Our ‘CISO Insider’ newsletter is rebranding to ‘Security Leader Insider’ to better reflect our evolving audience and the broader scope of the content we provide.
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
This months Threat Modeling Insider edition features a blog on the power of threat modeling capabilities and OWASP SAMM mapping for product security.
Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…