Welcome to the (first) edition of the CISO Insider Newsletter! Catch up with the latest industry developments, written by CISOs, for CISOs.
This blog will help you with navigating the first 3 months as a new CISO through 5 steps
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
In this edition, we get a deep dive into the 2023 Threat Modeling Connect Hackaton
Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.
In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.
On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant for the logistic industry
In this edition, we get a guest blog on The Hitchhiker’s Guide for Failing Threat Modeling
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…