Archive: 2020
Situational Awareness for Cyber Security Architecture: Tools for Monitoring and Response
Visibility into the activities within assets enables network security analysts to detect network compromises. Analysts monitor these activities directly on the device....
Read More•By Timothy J. Shimeall
In Situational Awareness
Three Risks in Building Machine Learning Systems
Machine learning (ML) systems promise disruptive capabilities in multiple industries. Building ML systems can be complicated and challenging....
Read More•By Benjamin Cohen
In Artificial Intelligence Engineering
The Latest Work from the SEI: DevSecOps, Artificial Intelligence, and Cybersecurity Maturity Model Certification
As part of an ongoing effort to keep you informed about our latest work, this blog post summarizes some recently published SEI reports, podcasts, conference papers, and webcasts highlighting our …
Read More•By Douglas Schmidt (Vanderbilt University)
In Enterprise Risk and Resilience Management
Cybersecurity Maturity Model Certification (CMMC) Part 2: Process Maturity's Role in Cybersecurity
Mature cybersecurity processes will improve an organization's ability to prevent and respond to a cyberattack
Read More•By Andrew F. Hoover, Katie C. Stewart
In Enterprise Risk and Resilience Management
COVID-19 and Supply-Chain Risk
Managing supply-chain risks from the new coronavirus outbreak is personally important to me. While my first concern--like everyone else's--is mitigating the direct public-health risk....
Read More•By Nathaniel Richmond
In Situational Awareness
KalKi: Solution for High Assurance Software-Defined IoT Security
Commercial Internet of things (IoT) devices are evolving rapidly, providing new and potentially useful capabilities. These devices can be a valuable source of data....
Read More•By Sebastián Echeverría
In Edge Computing
Detecting Mismatches in Machine-Learning Systems
The use of machine learning (ML) could improve many business functions and meet many needs for organizations. For example, ML capabilities can be used to suggest products to users based …
Read More•By Grace Lewis
In Artificial Intelligence Engineering
Writing and Delivering the Final DevOps Assessment Report: Seventh in a Series
The time has come for the final step of the DevOps Assessment: the final report. Now is your chance to document all your findings, recommendations, and related material....
Read More•By Jose A. Morales
In DevSecOps
Beyond NIST SP 800-171: 20 Additional Practices in CMMC
These 20 practices are intended to make DoD contractors more security conscious.
Read More•By Andrew F. Hoover, Katie C. Stewart
In Enterprise Risk and Resilience Management
Addressing Open Architecture in Software Cost Estimation
Identifying, estimating, and containing the cost of software is critical to the effective deployment of government systems....
Read More•By Michael J. Gagliardi, Michael D. Konrad, Douglas Schmidt (Vanderbilt University)
In Software Architecture
SEI Blog Archive
Recent
Year