The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…
Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…
Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures
In the fifth episode of The Wide Open, we welcome two experts, Jasper Hooft and Thomas Dejagere, who delve deeper into the NIS2 Directive within…
The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…
This blog will help you with navigating the first 3 months as a new CISO through 5 steps
Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.
Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.