Archive: 2021
Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment
This SEI blog post provides an overview of zero trust and management of its risk with SEI's cybersecurity engineering assessment framework.
• By Geoff Sanders
In Cybersecurity Engineering
![Geoff Sanders](/media/images/thumb_big_g-sanders_blog_author.max-180x180.format-webp.webp)
Comparing DevSecOps and Systems Engineering Principles
This SEI Blog post compares and contrasts DevSecOps and Systems Engineering Body of Knowledge (SEBoK), discussing their shared goals and areas of divergence.
• By Richard Turner
In DevSecOps
![Headshot of Richard Turner.](/media/images/thumb_big_r-turner_blog_authors.max-180x180.format-webp.webp)
A Game to Assess Human Decision Making with AI Support
In decision-support systems based on AI, humans often make poor choices causing the systems to be abandoned. Rotem Guttman introduces a game that collects data on actual human decision making …
• By Rotem D. Guttman
In Artificial Intelligence Engineering
![Rotem Guttman](/media/images/thumb_big_r-guttman_blog_author.max-180x180.format-webp.webp)
The Current State of DevSecOps Metrics
DevSecOps practices yield useful, valuable information about software performance that is likely to lead to innovations in software engineering metrics.
• By Bill Nichols
In DevSecOps
![Headshot of Bill Nichols.](/media/images/thumb_big_w-nichols_blog_author.max-180x180.format-webp_fY313O2.webp)
The Latest Work from the SEI: Privacy, Ransomware, Digital Engineering, and the Solar Winds Hack
These publications highlight the latest work of SEI technologists in software architecture, digital engineering, and ransomware.
• By Douglas Schmidt (Vanderbilt University)
In Software Engineering Research and Development
![Douglas C. Schmidt](/media/images/thumb_big_d-schmidt_blog_author.max-180x180.format-webp.webp)
Generating Realistic Non-Player Characters for Training Cyberteams
This SEI Blog post describes efforts underway to improve the realism of non-player characters (NPCs) in training exercises with new software called ANIMATOR.
• By Dustin D. Updyke, Tyler Brooks
In Cyber Workforce Development
![Dustin Updyke](/media/images/thumb_big_d-updyke_blog_authors.max-180x180.format-webp.webp)
![Headshot of Tyler Brooks](/media/images/thumb_big_t-brooks_blog_authors.max-180x180.format-webp.webp)
When Your Software’s “Check Engine” Light Is On: Identifying Design Problems that Impact Software Failure
This blog post summarizes an effective roadmap for detecting design problems that can be used to improve software development and performance.
• By Judy Hwang
In Software Architecture
![Judy Hwang](/media/images/hwang-j.max-180x180.format-webp.webp)
Automating System Security with AADL: 11 Rules for Ensuring a Security Model
This SEI Blog post presents an approach for modeling and validating confidentiality using AADL, and 11 analysis rules for ensuring security model consistency.
• By Aaron Greenhouse
In Software Architecture
![Headshot of Aaron Greenhouse](/media/images/thumb_big_a-greenhouse_blog_aut.max-180x180.format-webp.webp)
Integrating Safety and Security Engineering for Mission-Critical Systems
Critical systems must be safe from harm and secure, but safety and security practices have evolved in isolation. The SEI is improving coordination between safety and security engineering.
• By Sam Procter, Sholom G. Cohen
In Software Architecture
![Sam Procter](/media/images/thumb_big_s-procter_blog_author.max-180x180.format-webp.webp)
![sgc1](/media/images/sanford-cohen.max-180x180.format-webp.webp)
Aligning DevSecOps and Machine Learning
Luiz Antunes explores the machine learning (ML) and DevSecOps domains and proposes ways to use them in collaboration for increased performance.
• By Luiz Antunes
In DevSecOps
![Luiz Antunes](/media/images/thumb_big_l-antunes_blog_author.max-180x180.format-webp.webp)
SEI Blog Archive
Recent
Year