Tech companies go through 3 stages. Which cybersecurity issues do they face at each stage? We cover it all on this edition of The Wide…
The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…
In this Summer edition, Brook Schoenfield shares his insights on a wider adoption of threat modeling practices, in terms of tech challenges, risk problems, leadership,…
Toreon is pleased to announce a new partnership with NFIR, a Dutch leader in incident response and digital forensics
As a CISO, it is crucial to understand your responsibilities when it comes to cloud security. The cloud offers numerous benefits, but it also presents…
As we delve deeper into the ever-evolving world of cybersecurity and the challenges faced by CISOs, we are excited to bring you the latest insights…
Planning to develop your own application? You might want to consider the many possible pitfalls. We explain them in this article.
In our May edition of the TMI newsletter we show off The AI Attack Surface Map, a resource for thinking about the various attack surfaces…
In this blog post, we will explore how OWASP SAMM threat modeling can take security practices from “good” to “great” in implementing a robust Secure…
Want to integrate a cloud solution without a strategy? That’s risky. Check out what you need to do to grow your business safely with cloud…