Vincent Haerinck documented a typical day in his professional life at Toreon.
Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures
This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy
This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy
The CRA promotes innovation and cybersecurity in European digital products. Learn how your company can comply with applicable standards.
In the fifth episode of The Wide Open, we welcome two experts, Jasper Hooft and Thomas Dejagere, who delve deeper into the NIS2 Directive within…
February’s Threat Modeling Insider edition features a guest article by Ive Verstappen, who provides 3 scenarios for transforming a Cornucopia Card into a product backlog…
In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy