Archive: 2019
Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018
Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December …
Read More•By Douglas Schmidt (Vanderbilt University)
In Cloud Computing
Insider Threats in State and Local Government (Part 5 of 9: Insider Threats Across Industry Sectors)
Continuing our industry sector series, this blog post highlights insider threat trends in the State and Local Government subsector and explores distinct characteristics of fraud....
Read More•By Carrie Gardner
In Insider Threat
Governance of a Software Product Line: Complexities and Goals
My prior blog post on product lines in DoD sustainment described the complexity of contractual relationships in a DoD software product line....
Read More•By Robert Ferguson
Improving Assessments for Cybersecurity Training
The CERT Cyber Workforce Development Directorate conducts training in cyber operations for the DoD and other government customers as part of its commitment to strengthen the nation's cybersecurity workforce....
Read More•By April Galyardt
In Artificial Intelligence Engineering
Deep Learning and Satellite Imagery: DIUx Xview Challenge
In 2017 and 2018, the United States witnessed a milestone year of climate and weather-related disasters from droughts and wildfires to cyclones and hurricanes....
Read More•By Ritwik Gupta
In Artificial Intelligence Engineering
Challenges to Implementing DevOps in Highly Regulated Environments: First in a Series
In academia, government, and industry, DevOps has become a standard, straightforward option for streamlining efforts and increasing comprehensive participation by all stakeholders....
Read More•By Jose A. Morales
In DevSecOps
Evaluating Threat-Modeling Methods for Cyber-Physical Systems
Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....
Read More•By Nataliya Shevchenko
In Enterprise Risk and Resilience Management
Insider Threats in Information Technology (Part 6 of 9: Insider Threats Across Industry Sectors)
As Carrie Gardner wrote in the second blog post in this series, which introduced the Industry Sector Taxonomy, information technology (IT) organizations fall in the NAICS Code category professional, scientific, …
Read More•By Michaela Webster, Carrie Gardner
In Insider Threat
Expectations for Implementing DevOps in a Highly Regulated Environment: Second in a Series
This second installment in the blog post series on implementing DevOps in highly regulated environments (HREs), which is excerpted from a recently published paper, discusses the first step in a …
Read More•By Jose A. Morales
In DevSecOps
Using the SEI CERT Coding Standards to Improve Security of the Internet of Things
The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....
Read More•By David Svoboda
In Secure Development
SEI Blog Archive
Recent
Year