Archive: 2019
Situational Awareness for Cybersecurity: Assets and Risk
When key business assets are not adequately protected from cybersecurity breaches, organizations can experience dire consequences....
• By Angela Horneman, Lauren Cooper
In Situational Awareness
![Lauren Cooper](/media/images/thumb_big_l-cooper_blog_authors.max-180x180.format-webp.webp)
How to Build a Trustworthy Free/Libre Linux Capable 64-bit RISC-V Computer
The attack surface for commercial hardware now spans all stages of the development lifecycle. Even in the presence of secure, bug-free software, the growing threat of hardware Trojans and backdoors …
• By Gabriel Somlo
![Headshot of Gabriel Somlo](/media/images/thumb_big_g-somlo_blog_authors_.max-180x180.format-webp.webp)
It's Time to Retire Your Unsupported Things
"If it ain't broke, don't fix it." Why mess with something that already works? This is fair advice with many things in life. But when it comes to software security, …
• By Will Dormann
In CERT/CC Vulnerabilities
![Will Dormann](/media/images/thumb_big_w-dormann_blog_author.max-180x180.format-webp.webp)
Network Traffic Analysis with SiLK: Profiling and Investigating Cyber Threats
Cyber threats are on the rise, making it vitally important to understand what's happening on our computer networks. But the massive amount of network traffic makes this job hard....
• By Paul Krystosek, Timothy J. Shimeall, Nancy Ott
In Situational Awareness
![Paul Krystosek](/media/images/thumb_big_p-krystosek_blog_auth.max-180x180.format-webp.webp)
![Tim Shimeall](/media/images/thumb_big_t-shimeall_blog_autho.max-180x180.format-webp.webp)
Mapping Cyber Hygiene to the NIST Cybersecurity Framework
In honor of Cybersecurity Awareness Month, I decided to put fingers to keys and share some basic practices that every organization should consider for their cyber hygiene initiatives....
• By Matthew Trevors
In Insider Threat
![Headshot of Matthew Trevors.](/media/images/thumb_big_m-trevors_blog_author.max-180x180.format-webp.webp)
Could Blockchain Improve the Cybersecurity of Supply Chains?
A September 2018 report to the President, Assessing and Strengthening the Manufacturing and Defense Industrial Base and Supply Chain Resiliency of the United States, raised concerns about cybersecurity....
• By Eliezer Kanal
In Cybersecurity Engineering
![Eliezer Kanal](/media/images/thumb_big_e-kanal_blog_authors_.max-180x180.format-webp.webp)
Six Best Practices for Developer Testing
Code coverage represents the percent of certain elements of a software item that have been exercised during its testing....
• By Robert V. Binder
![Bob Binder](/media/images/thumb_big_b-binder_blog_authors.max-180x180.format-webp.webp)
VPN - A Gateway for Vulnerabilities
Virtual Private Networks (VPNs) are the backbone of today's businesses providing a wide range of entities from remote employees to business partners and...
• By Vijay S. Sarvepalli
In CERT/CC Vulnerabilities
![Vijay Sarvepalli](/media/images/thumb_big_v-sarvapalli_blog_aut.max-180x180.format-webp.webp)
Situational Awareness for Cybersecurity: Three Key Principles of Effective Policies and Controls
Security measures are most effective when it is clear how assets are supposed to be used and by whom....
• By Angela Horneman
In Situational Awareness
System Resilience: What Exactly is it?
Over the past decade, system resilience (a.k.a., system resiliency) has been widely discussed as a critical concern, especially in terms of data centers and cloud computing....
• By Donald Firesmith
In Cybersecurity Engineering
![Headshot of Donald Firesmith](/media/images/thumb_big_d-firesmith_blog_auth.max-180x180.format-webp.webp)
SEI Blog Archive
Recent
Year