Toreon News

Navigating the First 3 Months: 5 Steps to a Successful Career as a New CISO

This blog will help you with navigating the first 3 months as a new CISO through 5 steps

Lessons from Microsoft’s Azure App Misconfiguration

Toreonite Jasper Baes takes a look at the Microsoft’s Azure App Misconfiguration and sums up what we can learn from it.

The added benefit to early threat modeling that nobody talks about.

Toreonite Georges goes over the added benefit organizations can have when starting their threat modeling at an early stage of their development cycle.

The Importance of Accurate Notes During Threat Model Meetings

In this blog, junior consultant Cesar explains the proces of notetaking during Threat Modeling assessment meetings.

Dewaele

Ensuring the protection of sensitive client data and the IT infrastructure of Dewaele through VLAIO.

Cybersecurity: crucial in supply chain logistics

On Thursday, Feb. 28, cyber experts will meet at Log!ville in Niel, and give talks on various cybersecurity topics relevant for the logistic industry

Unlocking the Power of Threat Modeling: A Self-Paced Introduction for Stakeholders

Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…

Protecting the front door to your Microsoft cloud environment

As businesses continue to shift towards cloud-based operations, it’s crucial to ensure that your online systems access is properly secured. One key tool is Conditional…

2/2/23 – Toreon Cybersecurity Café

We’re proud to announce our Cybersecurity Café! Read more about it.

Start typing and press Enter to search

Shopping Cart