Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.
In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.
On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant for the logistic industry
In this edition, we get a guest blog on The Hitchhiker’s Guide for Failing Threat Modeling
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…
As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…
We’re proud to announce our Cybersecurity Café! Read more about it.
In this edition, we get a guest blog on Threat Modeling ICS & OT Landscapes – Mind that Gap, there’s a sharp EDGE, and more!
Steven takes a look at the popular ChatGPT, is it as impressive as people say?