Toreon Office | Grotehondstraat 44 1/1 - 2018 Antwerpen | +32 3 369 33 96
Incident Response | Data Protection Institute | Threat modeling
Discover the latest events and insights at Toreon. Join our vibrant community as we bring you compelling stories, expert opinions, and in-depth features on conferences, trade shows, exhibitions, and more.
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…
For this edition, we selected a variety of threat modeling content for you. From PASTA to SDWAN and everything in between.
We are happy to announce that we are working with Phished as our partner to bring security awareness to our clients.
In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?
Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
We would be happy to discuss your company’s digital security.
Start typing and press Enter to search