We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

TMI newsletter 12 – Keys to successful privacy threat modeling

Discover a guest article by Kim Wuyts covering “Keys to successful privacy threat modeling” and an update on our Threat Modeling Playbook.

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…

What do Belgian SMEs know about the GDPR and what can help them?

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

Patch management for ICS

Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.

TMI newsletter 11 Threat Modeling Definition of Done

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…

The Fog of More

How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while taking into account our business…

Fluvius

Toreon simply manages to put the right expert in the right place

Privacy Shield no longer valid. These are the alternatives.

Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…

Increasing cybersecurity threats 

Black hat hackers have become increasingly professional in recent years

Start typing and press Enter to search

Shopping Cart