The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…
In this blog, we cover continuous assessment and the benefits that it brings to the table.
Microsoft has recognized our level of expertise and awarded us this new level of partnership.
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
The rules are getting increasingly strict – look at the GDPR – and attackers are becoming ever more inventive. Luckily, an acceptable level of protection…