Learn how to align your cloud strategy with NIS2 and future regulations. Explore key compliance steps, risk management, and security tools to ensure long-term data…
The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…
In this blog, we cover continuous assessment and the benefits that it brings to the table.
Microsoft has recognized our level of expertise and awarded us this new level of partnership.
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…