Tony's Articles

Threat Modeling for Critical Infrastructure
Threat Modeling for Critical Infrastructure
Harnessing power of CIE, CCE methodologies to build resilience across critical infrastructure sectors
Harnessing power of CIE, CCE methodologies to build resilience across critical infrastructure sectors
Unraveling Security Engineering -Product vs. Systems in Critical Infrastructure
Unraveling Security Engineering -Product vs. Systems in Critical Infrastructure
Securing Critical Infrastructure with SEMM - Security Engineering Maturity Matrix
Securing Critical Infrastructure with SEMM – Security Engineering Maturity Matrix
CSRB report on Log4j open source vulnerabilities demands better software ecosystem, future investments
CSRB report on Log4j open source vulnerabilities demands better software ecosystem, future investments

More Tony's Articles

1 post