- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Creating a Large Language Model Application Using Gradio

This post explains how to build a large language model across three primary use cases: basic question-and-answer, question-and-answer over documents, and document summarization.
• By Tyler Brooks
In Artificial Intelligence Engineering

Don’t Wait for ROI on Model-Based Analysis for Embedded Computing Resources

This SEI Blog post examines the design and implementation of embedded computing resources for CPS, the complexities of which drive the need for model building.
• By Alfred Schenker, Jerome Hugues
In Cyber-Physical Systems


Explainability in Cybersecurity Data Science

This post provides an overview of explainability in machine learning and includes illustrations of model-to-human and human-to-model explainability.
• By Jeffrey Mellon, Clarence Worrell
In Cybersecurity Engineering


Generative AI Q&A: Applications in Software Engineering
This post explores the transformative impacts of generative AI on software engineering as well as its practical implications and adaptability in mission-critical environments.
• By John E. Robert, Douglas Schmidt (Vanderbilt University)
In Artificial Intelligence Engineering


The OSATE Slicer: Fast Reachability Query Support for Architectural Models

Our post introduces the OSATE Slicer, a new extension to the Open Source AADL Tool Environment that adapts a concept called slicing to architectural models of embedded, critical systems.
• By Sam Procter
In Software Architecture

The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain
This post presents a framework to promote the use of SBOMs and establish practices and processes that organizations can leverage as they build their programs.
• By Christopher J. Alberts, Michael S. Bandor, Charles M. Wallen, Carol Woody
In Secure Development


Dealing with Noisy Behavioral Analytics in Detection Engineering

This post discusses a process for tuning and related work you can do to make behavioral analytics more viable in your environment, without sacrificing analytic coverage.
• By Sean Hutchison
In Situational Awareness

The 13 Key Elements of an Insider Threat Program

COVID-19 changed the nature of the workplace. In this evolving climate, organizations need to be increasingly vigilant against insider incidents. In this post, we present the 13 key elements of …
• By Daniel L. Costa, Randall F. Trzeciak
In Insider Threat


Assuring Cyber-Physical Systems in an Age of Rising Autonomy

This post discusses research by the SEI and Georgia Tech to address a number of challenges related to the rising volume of sensor data in autonomous cyber-physical systems.
• By Jerome Hugues
In Cyber-Physical Systems

Secure by Design at CERT
The national cybersecurity strategy calls on tech providers to ensure that all their products are secure by design and secure by default. This post highlights the SEI CERT Division's continued …
• By Greg Touhill
In Cybersecurity Engineering

Explore Topics
- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed