Cyber-security¶
Threat Modeling¶
- Supercharging AppSec Threat Modeling Services with GenAI and Semantic Graphs
- Threat Models as Mandatory Disclosures: A Vision for Security Transparency
- Advancing Threat Modeling with Semantic Knowledge Graphs
- Using Threat Modeling and Semantic Graphs to Secure the Digital Supply Chain
- Graphs of Graphs of Graphs (G3) in Threat Modeling
- Scaling Supply Chain Security using Threat Modeling Semantic Knowledge Graphs and Maps
- Linking Threat Models with Semantic Business Graphs
Misc topics¶
- Ephemeral GenAI SIEM: A Serverless, Graph-Driven Approach to Security Event Management
- Using Memory_FS to Build a File-Based Representation of the GDPR Standard
- FIST Meets the Semantic Knowledge Graph: Aligning Fast, Inexpensive, Simple, Tiny with Dinis Cruz's G³ Approach
- Project Plan: High Street GenAI Learning Hub
- Personal Content Rights: Protecting Individuals in the Age of Deepfakes and AI Cloning
- Security Implications of the Model Context Protocol (MCP) and the Need for Robust Infrastructure
- Semantic Knowledge Graphs for LLM-Driven Source Code Analysis
- OAuth Security Concerns and Implications for the Model Context Protocol (MCP)
- Security Debrief: OpenAI’s ChatGPT Connector GitHub App
- Fail Safe, Not Fail Big: Cyber-Security-Inspired Strategies to Prevent the Next Iberian Grid Crisis
- Second Stories: From Three Mile Island to Cybersecurity
SAST¶
OWASP¶
See more Cyber-Security research documents in these LinkedIn posts: Part 1 and Part 2