Application Security coaching

Implementing security requirements to ‘shift left’ and create ‘secure by design’ software

In this blog, we take a look at why good security requirements are important and how these should be constructed.

We organized our first cybersecurity debate

We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.

Four key Cloud Security take-aways from a Hacker’s POV

Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

Toreon presents Threat Modeling workshop at SecAppDev 2019

At SecAppDev our CEO Sebastien Deleersnyder proposes an action-packed 1 day Threat Modeling workshop.

Start typing and press Enter to search

Shopping Cart