The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Regardless of the SBOM tool, the output should be consistent for a given piece of software. But ...
This collection includes presentations and videos from the Secure Software by Design Conference held on August 19-20, 2025, in Arlington, VA.
Keylor, E., Beveridge, R., and Frederick, J., 2025: Amplifying AI Readiness in the DoD Workforce. Carnegie Mellon University, Software Engineering Institute's ...
Complete the form below to register and download a free online copy of SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition).
Executive Order 13587 requires federal agencies that operate or access classified computer networks to implement an insider threat detection and prevention program. Proposed changes to the National ...
Snoke, T., Shick, D., and Horneman, A., 2013: Working with the Internet Census 2012. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
5 Essential Questions for Implementing the Software Acquisition Pathway and the Tools to Tackle Them
In this webcast, Eileen Wrubel and Brigid O’Hearn discuss the launch of the Software Acquisition Go Bag. Our SEI team has helped hundreds of DoD programs deliver software-enabled capability through ...
In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results