Archive: 2019
Top 5 Incident Management Issues
The CERT Division of the SEI has a history of helping organizations develop, improve, and assess their incident management functions....
Read More•By Mike Fritz
In Insider Threat
An Appraisal of the Systems Engineering Journal's Treatment of Software Over the Last Two Decades
Systems engineers working today face many challenges, both in building the complex systems of systems of the future and in building the complex systems of which they are composed....
Read More•By Sarah Sheard
Insider Threats in Healthcare (Part 7 of 9: Insider Threats Across Industry Sectors)
Next in the Insider Threats Across Industry Sectors series is Healthcare. As Healthcare-related information security conversations are predominantly driven by security and privacy concerns....
Read More•By Josh Vasko, Carrie Gardner
In Insider Threat
The Modern Software Factory and Independent V&V for Machine Learning: Two Key Recommendations for Improving Software in Defense Systems
This post highlights recommendations from a Defense Science Board report on how to improve software acquisition in defense.
Read More•By Paul Nielsen
In Artificial Intelligence Engineering
Operation Cloud Hopper Case Study
In December, a grand jury indicted members of the APT10 group for a tactical campaign known as Operation Cloud Hopper, a global series of sustained attacks against managed service providers …
Read More•By Nathaniel Richmond
In Cloud Computing
Towards a New Model of Acquisition: Product-Line Architectures for the DoD - Second in a Series
It is widely recognized that the Department of Defense (DoD) needs to have a nimble response to nimble adversaries....
Read More•By Nickolas Guertin, Douglas Schmidt (Vanderbilt University)
Insider Threats in Entertainment (Part 8 of 9: Insider Threats Across Industry Sectors)
The Entertainment Industry is the next spotlight blog in the Industry Sector series. Movie and television producers have long entertained the public with insider threat dramas such as Jurassic Park....
Read More•By Mark Dandrea, Carrie Gardner
In Insider Threat
Enabling Shift-Left Testing from Small Teams to Large Systems
Shift left is a familiar exhortation to teams and organizations engaged in Agile and Lean software development. It most commonly refers to incorporating test practices....
Read More•By Nanette Brown
In Agile
API Hashing Tool, Imagine That
In the fall of 2018, the CERT Coordination Center (CERT/CC) Reverse Engineering (RE) Team received a tip from a trusted source about a YARA rule that triggered an alert in …
Read More•By Kyle O'Meara, CERT Insider Threat Center
In CERT/CC Vulnerabilities
Securely Connecting Africa
While the Internet has enabled modernization in parts of the developing world, it has also introduced new cybersecurity challenges....
Read More•By Vijay S. Sarvepalli
In Cybersecurity Center Development
SEI Blog Archive
Recent
Year