- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Cyber-Informed Machine Learning
This blog post proposes cyber-informed machine learning as a conceptual framework for emphasizing three types of explainability when ML is used for cybersecurity.
Read More•By Jeffrey Mellon, Clarence Worrell
In Cybersecurity Engineering
![Photo of Jeffrey Mellon](/media/images/thumb_big_jl-mellon_blog_author.max-180x180.format-webp.webp)
![Headshot of Clarence Worrell.](/media/images/Worrell_Clarence_003_240919.360.max-180x180.format-webp.webp)
Introducing the Insider Incident Data Exchange Standard (IIDES)
Capturing and sharing information about insider incidents is a challenge. This post introduces the Insider Incident Data Exchange Standard (IIDES) schema for insider incident data collection.
Read More•By Austin Whisnant
In Insider Threat
![Austin Whisnant](/media/images/thumb_big_a-whisnant_blog_autho.max-180x180.format-webp.webp)
6 Lessons Learned from Hosting the President's Cup Cybersecurity Competition
During its six years supporting the President's Cup, the SEI has fielded nearly 4,000 help-desk tickets.
Read More•By John Diricco
In Cyber Workforce Development
![John DiRicco](/media/images/jvdiricco.max-180x180.format-webp.webp)
13 Cybersecurity Predictions for 2025
It’s that time of year when we reflect on the past year and eagerly look forward. This post presents 13 cyber predictions for 2025.
Read More•By Greg Touhill
In Cybersecurity Engineering
![Headshot of Greg Touhill.](/media/images/Touhill_Greg_393_2023.360x360.max-180x180.format-webp.webp)
The Myth of Machine Learning Non-Reproducibility and Randomness for Acquisitions and Testing, Evaluation, Verification, and Validation
A reproducibility challenge faces machine learning (ML) systems today. This post explores configurations that increase reproducibility and provides recommendations for these challenges.
Read More•By Andrew O. Mellinger, Daniel Justice, Marissa Connor, Shannon Gallagher, Tyler Brooks
In Artificial Intelligence Engineering
![Headshot of Andrew Mellinger.](/media/images/Mellinger_Andrew_103_230111.360.max-180x180.format-webp.webp)
![Headshot of Daniel Justice.](/media/images/Justice_Dan_1013_2023.max-180x180.format-webp.webp)
The Top 10 Blog Posts of 2024
This post presents the top 10 most-visited posts of 2024, highlighting our work in software acquisition, artificial intelligence, large language models, secure coding, and more.
Read More•By Bill Scherlis
In Software Engineering Research and Development
![Headshot of Bill Scherlis.](/media/images/thumb_big_b-scherlis_blog_autho.max-180x180.format-webp.webp)
The Latest Work from the SEI: Insider Risk, Bias in LLMs, Secure Coding, and Designing Secure Systems
The latest work from SEI technologists in the areas of insider risk, large language models, secure coding and static analysis.
Read More•By Bill Scherlis
In Software Engineering Research and Development
![Headshot of Bill Scherlis.](/media/images/thumb_big_b-scherlis_blog_autho.max-180x180.format-webp.webp)
Beyond Capable: Accuracy, Calibration, and Robustness in Large Language Models
For any organization seeking to responsibly harness the potential of large language models, we present a holistic approach to LLM evaluation that goes beyond accuracy.
Read More•By Matthew Walsh, David Schulker, Shing-hon Lau
In Artificial Intelligence Engineering
![Headshot of Matthew Walsh.](/media/images/Walsh_Matthew_039_240429.360x36.max-180x180.format-webp.webp)
![David Schulker](/media/images/dschulker.max-180x180.format-webp.webp)
Cyber-Physical Sensing to Extend the National Intelligence, Surveillance, and Reconnaissance Mesh
With the growing importance of improved sensing for national security, leveraging sensors in consumer products or embedded in devices can be economical, flexible, and timely.
Read More•By Matthew Walsh, David Schulker, Dominic A. Ross, Devin Michael Cortese
In Cyber-Physical Systems
![Headshot of Matthew Walsh.](/media/images/Walsh_Matthew_039_240429.360x36.max-180x180.format-webp.webp)
![David Schulker](/media/images/dschulker.max-180x180.format-webp.webp)
GenAI for Code Review of C++ and Java
Would ChatGPT-3.5 and ChatGPT-4o correctly identify errors in noncompliant code and correctly recognize compliant code as error-free?
Read More•By David Schulker
In Artificial Intelligence Engineering
![David Schulker](/media/images/dschulker.max-180x180.format-webp.webp)
Explore Topics
- Agile
- Artificial Intelligence Engineering
- CERT/CC Vulnerabilities
- Cloud Computing
- Cyber-Physical Systems
- Cybersecurity Center Development
- Cybersecurity Engineering
- Cyber Workforce Development
- DevSecOps
- Edge Computing
- Enterprise Risk and Resilience Management
- Insider Threat
- Model-Based Systems Engineering
- Quantum Computing
- Reverse Engineering for Malware Analysis
- Secure Development
- Situational Awareness
- Software Architecture
- Software Engineering Research and Development
- Technical Debt
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.
Subscribe Get our RSS feedGet updates on our latest work.
Each week, our researchers write about the latest in software engineering, cybersecurity and artificial intelligence. Sign up to get the latest post sent to your inbox the day it's published.
Subscribe Get our RSS feed