In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?
Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
Discover the top 4 cybersecurity challenges we frequently see pop up.
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…
At SecAppDev our CEO Sebastien Deleersnyder proposes an action-packed 1 day Threat Modeling workshop.