News

MAY 7, 2025 — The Cybersecurity Manufacturing Innovation Institute (CyManII) at UTSA has launched its latest enterprise, the ...
It can be used as a tool for the systematic assessment of a cloud implementation, and provides guidance on which security controls should be implemented by which actor within the cloud supply chain.