The CRA promotes innovation and cybersecurity in European digital products. Learn how your company can comply with applicable standards.
In the fifth episode of The Wide Open, we welcome two experts, Jasper Hooft and Thomas Dejagere, who delve deeper into the NIS2 Directive within…
February’s Threat Modeling Insider edition features a guest article by Ive Verstappen, who provides 3 scenarios for transforming a Cornucopia Card into a product backlog…
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy
We’re excited to announce the third edition of our Cybersecurity Café, an evening filled with cybersecurity insights!
The European Commission has incorporated the newly established CYSSME collaboration into its Digital Europe funding programme.
This month’s edition features a guest article by Jonathan Marcil, Application Security Specialist, on learning threats in a post ChatGPT world.
Ever wondered what a typical day looks like for cybersecurity expert Steven Wierckx? From executing threat models to managing our Toreon academy, Steven wrote it…
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy
This month’s edition features a guest article by Chris Romeo, CEO & co-founder of Devici, where he talks about the world’s first Threat Modeling Conference.