Archive: 2019
How to Use Static Analysis to Enforce SEI CERT Coding Standards for IoT Applications
The Jeep hack, methods to hack ATMs, and even hacks to a casino's fish tank provide stark evidence of the risks associated with the Internet of Things (IoT)....
Read More•By David Svoboda
In Secure Development
Business Email Compromise: Operation Wire Wire and New Attack Vectors
In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....
Read More•By Anne Connell
In Reverse Engineering for Malware Analysis
Establishing the Pre-assessment DevOps Posture of an SDLC in a Highly Regulated Environment: Third in a Series
This third installment in our blog series on implementing DevOps in highly regulated environments (HREs), which is based upon a recently published paper, discusses the second step in a DevOps …
Read More•By Jose A. Morales
In DevSecOps
A New Scientifically Supported Best Practice That Can Enhance Every Insider Threat Program!
The CERT National Insider Threat Center (NITC) continues to transition its insider threat research to the public through its publications of the Common Sense Guide to Mitigating Insider Threats (CSG)....
Read More•By Michael C. Theis, CERT Insider Threat Center
In Insider Threat
Six Free Tools for Creating a Cyber Simulator
It can be hard for developers of cybersecurity training to create realistic simulations and training exercises when trainees are operating in closed (often classified) environments with no ability to connect …
Read More•By Joseph Mayes
In Cyber Workforce Development
A 5-Step Process for Release Planning
Software products are often used for two decades or more. Several researchers have shown the cost of maintenance and sustainment ranges between 40- and 80 percent of the total lifecycle …
Read More•By Robert Ferguson
The CERT Division's National Insider Threat Center (NITC) Symposium
Addressing the Challenges of Maturing an Insider Threat (Risk) ProgramOn May 10, 2019, the Software Engineering Institute's National Insider Threat Center (NITC) will host....
Read More•By Randall F. Trzeciak
In Insider Threat
The Organizational Impact of a Modular Product Line Architecture in DoD Acquisition - Third in a Series
To maintain a strategic advantage over its adversaries, the Department of Defense (DoD) must field new technologies rapidly....
Read More•By Nickolas Guertin, Douglas Schmidt (Vanderbilt University)
In Software Architecture
The Technical Architecture for Product Line Acquisition in the DoD - Fourth in a Series
DoD technologies have traditionally relied on cyber-physical/software-intensive systems that are now widely available to all nations and non-state actors....
Read More•By Nickolas Guertin, Douglas Schmidt (Vanderbilt University)
In Software Architecture
Managing the Consequences of Technical Debt: 5 Stories from the Field
If you participate in the development of software, the chances are good that you have experienced the consequences of technical debt....
Read More•By Ipek Ozkaya, Robert Nord
In Technical Debt
SEI Blog Archive
Recent
Year