In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In the ever-changing landscape of cybersecurity, the Cybersecurity Regulatory Act (CRA) stands as a pivotal development. This edition is dedicated to unraveling the CRA’s impact,…
Day in the Life: Thomas Heyman Step into the shoes of Thomas Heyman, a dedicated cybersecurity consultant, as we explore a typical day in his…
A CISO is the last line of defence to protect your assets. What’s the CISO’s role? And what makes a good CISO?
Tech companies go through 3 stages. Which cybersecurity issues do they face at each stage? We cover it all on this edition of The Wide…
The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…
In this Summer edition, Brook Schoenfield shares his insights on a wider adoption of threat modeling practices, in terms of tech challenges, risk problems, leadership,…
Toreon is pleased to announce a new partnership with NFIR, a Dutch leader in incident response and digital forensics
As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…