The European Commission has incorporated the newly established CYSSME collaboration into its Digital Europe funding programme.
This month’s edition features a guest article by Jonathan Marcil, Application Security Specialist, on learning threats in a post ChatGPT world.
This month’s edition features a guest article by Chris Romeo, CEO & co-founder of Devici, where he talks about the world’s first Threat Modeling Conference.
In this edition we talk about 5 Challenges of Rolling Out Threat Modeling within an Enterprise-Sized Company and curated content taking a deep dive into…
In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In the ever-changing landscape of cybersecurity, the Cybersecurity Regulatory Act (CRA) stands as a pivotal development. This edition is dedicated to unraveling the CRA’s impact,…
A CISO is the last line of defence to protect your assets. What’s the CISO’s role? And what makes a good CISO?
Tech companies go through 3 stages. Which cybersecurity issues do they face at each stage? We cover it all on this edition of The Wide…
The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…