Lessons from Microsoft’s Azure App Misconfiguration

Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.

The added benefit to early threat modeling that nobody talks about.

Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.

TMI newsletter 23 – Supply-Chain Security: Evaluation of Threats and Mitigations

In this edition, we get a guest blog on Supply-Chain Security: Evaluation of Threats and Mitigations

The Importance of Accurate Notes During Threat Model Meetings

In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.

Cybersecurity: crucial in supply chain logistics

On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant for the logistic industry

Unlocking the Power of Threat Modeling: A Self-Paced Introduction for Stakeholders

Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…

Protecting the front door to your Microsoft cloud environment

As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…

2/2/23 – Toreon Cybersecurity Café

We’re proud to announce our Cybersecurity Café! Read more about it.

Start typing and press Enter to search

Shopping Cart