In this edition, we get a take a look at the Developer-driven threat modeling at OutSystems
Welcome to the (first) edition of the CISO Insider Newsletter! Catch up with the latest industry developments, written by CISOs, for CISOs.
This blog will help you with navigating the first 3 months as a new CISO through 5 steps
Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.
In this edition, we get a deep dive into the 2023 Threat Modeling Connect Hackaton
Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.
In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.
On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant for the logistic industry
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…