Governance risk and compliance

Yes, you can protect your company against ransomware

Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

In the pocket

Toreon understands the development business and in terms of technical knowledge they are a lot more advanced. The Belgian digital product studio In The Pocket…

3 recommendations to protect your data

Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…

4 pitfalls to avoid when building a CSOC

Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

7 steps to set up a cybersecurity program

To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…

GDPR standard as forerunner for GDPR ISO standardisation

Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.

Tips for demonstrating compliance to the awareness requirement

As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…

We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.

Start typing and press Enter to search

Shopping Cart