loader image

Featured Post

Introducing RiskFlow™

We’ve added a new data visualization tool to RiskTree. It’s a Sankey diagram for risk, showing how your risks change as you introduce countermeasures. he example above shows a typical diagram, with risks moving from intrinsic on the left, to residual in the middle, to target on the right.

Other Posts

Tony B-E

Hello!

Welcome to the 2T Security blog. We've created this so that we can write about security and risk topics that interest us, and that might be of interest to the community. We'll […]
Read More
Tony B-E

RiskTree update

[…]
Read More
Tony B-E

Introducing RiskFlow™

A […]
Read More
Tony B-E

Principles are good, but exceptions are OK

Recently we discussed the security of RiskTree with a client, who ran through the NCSC Cloud Security Principles. Since RiskTree is delivered as software-as-a-service, this made […]
Read More
Tony B-E

May update for RiskTree

The latest update for RiskTree has just gone live. There aren't any big, flashy features this time - just a number of incremental […]
Read More
Wayne Perks

How we’re using SpectX log analysis as a security tool

[…]
Read More
Tony B-E

Deploying SciPy on AWS

Fun and games with Elastic Beanstalk config files This is a bit of a technical post for RiskTree, but I thought that […]
Read More
Tony B-E

We’ll be at CyberUK on 10/11 May

[…]
Read More

Want to find out more?

You can find out more about 2T Security and the work we do to support and protect the British Government infrastructure by visiting our website. There you can also get more information on RiskTree,