Archive: 2020
Insider Threat Incidents: Most Commonly Affected Devices
Learn about the most common devices affected by insider threat incidents and their impact on insider risk management and incident response in this SEI Blog post.
Read More•By Sarah Miller, Alex Pickering
In Insider Threat
Organizational Resilience to Insider Threats
This SEI Blog post explores the activities of the CERT National Insider Threat Center and offers strategies for operational resilience.
Read More•By Daniel L. Costa
In Insider Threat
8 Steps for Migrating Existing Applications to Microservices
In this blog post, I describe a plan for how organizations that wish to migrate existing applications to microservices can do so safely and effectively.
Read More•By Brent Frye
In Software Architecture
Balancing Cyber Confidence and Privacy Concerns
Learn about the privacy protocols that make it hard to protect enterprise networks, and their impact on network traffic monitoring in this SEI Blog post.
Read More•By Bill Reed, Dustin D. Updyke
In Enterprise Risk and Resilience Management
Follow the CUI: 4 Steps to Starting Your CMMC Assessment
One of the primary drivers of the DoD's Cybersecurity Maturity Model Certification (CMMC) is the congressional mandate to reduce the risk of accidental disclosure of controlled unclassified information (CUI).
Read More•By Matthew Trevors
In Enterprise Risk and Resilience Management
Is Your Organization Using Cybersecurity Analysis Effectively?
This SEI Blog post explores how organizations can effectively use cybersecurity analysis and discusses the importance of an effective incident response plan.
Read More•By Angela Horneman
In Situational Awareness
Managing Static Analysis Alerts with Efficient Instantiation of the SCAIFE API into Code and an Automatically Classifying System
Learn how the SEI's SCAIFE API helps classify and prioritize static analysis alerts, reduce manual effort, and improve accuracy in identifying code flaws.
Read More•By Lori Flynn
Managing the Risks of Adopting AI Engineering
This SEI Blog post discusses how organizations can manage the risks associated with adopting AI engineering, including developing a risk management framework.
Read More•By Brett Tucker
In Artificial Intelligence Engineering
Migrating Applications to Kubernetes
This SEI Blog post offers a process for Kubernetes migration planning by asking relevant questions, considering differences in cloud-native architectures.
Read More•By Richard Laughlin
In DevSecOps
Network Segmentation: Concepts and Practices
In this blog post, we review the basics of network segmentation and describe how organizations should implement it as an ongoing process.
Read More•By Daniel J. Kambic, Jason Fricke
SEI Blog Archive
Recent
Year