IriusRisk Press Release

Toreon Launches Threat Modeling Certification Program in Partnership with IriusRisk

Threat Modeling Trends and Insights from ThreatModCon 2024

Our threat modeling experts, Sebastien Deleersnyder and Steven Wierckx, share their experience attending two significant events in the U.S.: the OWASP Global AppSec 2024 and…

Threat Modeling Insider – October 2024

This packed edition features a guest article by Ben Ramirez on Threat Modeling for Retrieval-Augmented Generation (RAG) AI Applications.

Navigating the Upcoming NIS2 Legislation: Key Short-Term Deadlines and Compliance Essentials for Belgian Organizations

The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…

Threat Modeling Insider – September 2024

This months Threat Modeling Insider edition features a blog on the friction often encountered during DevSecOps adoption and highlights how Threat Modeling can be the…

Security Leader Insider – September 2024

Our ‘CISO Insider’ newsletter is rebranding to ‘Security Leader Insider’ to better reflect our evolving audience and the broader scope of the content we provide.

Navigating the compliance maze as a CISO

Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…

Threat Modeling Insider – August 2024

This months Threat Modeling Insider edition features a blog on the power of threat modeling capabilities and OWASP SAMM mapping for product security.

The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

Start typing and press Enter to search

Shopping Cart