Toreon Launches Threat Modeling Certification Program in Partnership with IriusRisk
Our threat modeling experts, Sebastien Deleersnyder and Steven Wierckx, share their experience attending two significant events in the U.S.: the OWASP Global AppSec 2024 and…
This packed edition features a guest article by Ben Ramirez on Threat Modeling for Retrieval-Augmented Generation (RAG) AI Applications.
The upcoming Network and Information Security Directive 2 (NIS2) legislation is a significant development for businesses operating across the EU. This blog post outlines the…
This months Threat Modeling Insider edition features a blog on the friction often encountered during DevSecOps adoption and highlights how Threat Modeling can be the…
Our ‘CISO Insider’ newsletter is rebranding to ‘Security Leader Insider’ to better reflect our evolving audience and the broader scope of the content we provide.
Explore the evolving role of CISOs as they navigate increasing regulatory challenges in cybersecurity. Learn about key laws, risk management, resilience, supply chain security, and…
This months Threat Modeling Insider edition features a blog on the power of threat modeling capabilities and OWASP SAMM mapping for product security.
In a bid to bolster the cybersecurity of critical infrastructure organizations across Europe, the European Commission is rolling out a new initiative under the NIS2…
This edition focuses on demystifying the NIS2 directive, with a guest article by Taco Mulder and our latest The Wide Open podcast, featuring Jasper Hooft…