Trainee Yael shares some tips on how to jumpstart your career in cybersecurity.
Our co-founder and CTO has been crowned The Cybersecurity Personality of the Year. Read more on this award and why they chose Sebastien.
The core idea behind risk calculation is that it should allow an organization to score different elements in an objective, repeatable manner. However, these parameters…
Threat modeling is a vital aspect of software development and cybersecurity, but it can be a challenge to fully understand its importance and how to…
We are happy to announce that we are working with Phished as our partner to bring security awareness to our clients.
In this article we tackle two Attack Tree tools and comepare them. Are they worth using or not?
Microsoft has been warning organizations for so called consent phishing attacks, we explain what these attacks are and how we plan to stop them.
In just 3 steps, we show you how to implement application risk profiling sucessfully in your organization.
In this blog, we take a look at why good security requirements are important and how these should be constructed.
Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.