Navigating the compliance maze as a CISO

Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…

Threat Modeling Insider – August 2024

This months Threat Modeling Insider edition features a blog on the power of threat modeling capabilities and OWASP SAMM mapping for product security.

The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

Toreon partner of CYSSDE: New cybersecurity consortium to fund penetration testing across the EU

In a bid to bolster the cybersecurity of critical infrastructure organizations across Europe, the European Commission is rolling out a new initiative under the NIS2…

CISO Insider – June 2024

This edition focuses on demystifying the NIS2 directive, with a guest article by Taco Mulder and our latest The Wide Open podcast, featuring Jasper Hooft…

Threat Modeling Insider – May 2024

This months Threat Modeling Insider edition features a chance to win a ticket to ThreatModCon in Lisbon!

Threat Modeling Playbook – Part 5 Innovate with threat model technology

In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy

Vincent Haerinck – Day In The Life

Vincent Haerinck documented a typical day in his professional life at Toreon.

4/06/2024 – Toreon Webinar: How to prepare for the NIS2 Directive

Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures​

Start typing and press Enter to search

Shopping Cart