- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Join the SEI and White House OSTP to Explore the Future of Software and AI Engineering

The SEI and the White House OSTP will co-host a workshop to inform a community strategy for building and maintaining U.S. leadership in software engineering and artificial intelligence (AI) engineering.
• By Anita Carleton, John Robert, Mark Klein, Douglas C. Schmidt, Erin Harper
In Software Engineering Research and Development


How Can Causal Learning Help to Control Costs?

This post describes how to apply causal-modeling algorithms and tools to project data to identify, measure, and test causality.
• By Michael Konrad
In Software Engineering Research and Development

The Challenge of Adversarial Machine Learning

This SEI Blog post examines how machine learning systems can be subverted through adversarial machine learning, the motivations of adversaries, and what researchers are doing to mitigate their attacks.
• By Matthew Churilla, Nathan VanHoudnos, Robert Beveridge
In Artificial Intelligence Engineering


Process and Technical Vulnerabilities: 6 Key Takeaways from a Chemical Plant Disaster

Weak processes can be as risky as technical vulnerabilities. This post describes how both of them worsened a cyber attack on a chemical plant.
• By Dan Kambic
In Enterprise Risk and Resilience Management

Actionable Data from the DevSecOps Pipeline

In this blog post, we explore decisions that program managers make and information they need to confidently make decisions with data from DevSecOps pipelines.
• By Bill Nichols, Julie Cohen
In DevSecOps


8 Areas of Future Research in Zero Trust
The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal cybersecurity through the implementation of a zero trust architecture.
• By Matthew Nicolai, Trista Polaski, Timothy Morrow
In Cybersecurity Engineering


Designing Great Challenges for Cybersecurity Competitions

This blog post highlights the SEI’s experience developing cybersecurity challenges for the President’s Cup Cybersecurity Competition and general-purpose guidelines and best practices for developing effective challenges.
• By Jarrett Booz, Josh Hammerstein, Matthew Kaar
In Cyber Workforce Development


Cybersecurity of Quantum Computing: A New Frontier

This post details issues related to creating the discipline of cyber protection of quantum computing and also outlines six areas of future research in the field of quantum cybersecurity.
• By Thomas Scanlon
In Quantum Computing

Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service

This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data onto DNS queries.
• By Tim Shimeall
In Cybersecurity Engineering

How to Use Docker and NS-3 to Create Realistic Network Simulations

This post provides a tutorial with code samples on using Docker and NS-3 to Create Realistic Network Simulations.
• By Alejandro Gomez
In Software Architecture

Explore Topics
- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- CSIRT Development
- Cyber Workforce Development
- Cyber-Physical Systems
- Cybersecurity Engineering
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed