SEI Blog | Cybersecurity Engineeringhttps://insights.sei.cmu.edu/feeds/topic/cybersecurity-engineering/atom/?utm_source=blog&utm_medium=rss2024-03-18T00:00:00-04:00Updates on changes and additions to the SEI Blog for posts matching Cybersecurity EngineeringAPI Security through Contract-Driven Programming2024-03-18T00:00:00-04:002024-03-18T00:00:00-04:00Alexander Veseyhttps://insights.sei.cmu.edu/blog/api-security-through-contract-driven-programming/This blog post explores contract programming and specifically how that applies to the building, maintenance, and security of APIs.Explainability in Cybersecurity Data Science2023-11-20T00:00:00-05:002023-11-20T00:00:00-05:00Jeffrey Mellon, Clarence Worrellhttps://insights.sei.cmu.edu/blog/explainability-in-cybersecurity-data-science/This post provides an overview of explainability in machine learning and includes illustrations of model-to-human and human-to-model explainability.Secure by Design at CERT2023-10-09T00:00:00-04:002023-10-09T00:00:00-04:00Gregory Touhillhttps://insights.sei.cmu.edu/blog/secure-by-design-at-cert/The national cybersecurity strategy calls on tech providers to ensure that all their products are secure by design and secure by default. This post highlights the SEI CERT Division's continued and longstanding efforts to ensure security by design in fielded software.3 Activities for Making Software Secure by Design2023-09-05T00:00:00-04:002023-09-05T00:00:00-04:00Carol Woody, Robert Schielahttps://insights.sei.cmu.edu/blog/3-activities-for-making-software-secure-by-design/Understanding key principles, roadblocks, and accelerators can shift the secure software development paradigm.Using Game Theory to Advance the Quest for Autonomous Cyber Threat Hunting2023-07-24T00:00:00-04:002023-07-24T00:00:00-04:00Phil Grocehttps://insights.sei.cmu.edu/blog/Using-Game-Theory-to-Advance-Cyber-Threat-Hunting/This SEI Blog post describes an effort to apply game theory to the development of algorithms suitable for informing a fully autonomous threat hunting capability and introduces the concept of chain games, a set of games in which threat hunting strategies can be evaluated and refined.8 Areas of Future Research in Zero Trust2023-04-24T00:00:00-04:002023-04-24T00:00:00-04:00Matthew Nicolai, Trista Polaski, Timothy Morrowhttps://insights.sei.cmu.edu/blog/8-areas-of-future-research-in-zero-trust/The National Cybersecurity Strategy was released on March 1st, 2023 to improve federal cybersecurity through the implementation of a zero trust architecture.Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service2023-04-03T00:00:00-04:002023-04-03T00:00:00-04:00Timothy Shimeallhttps://insights.sei.cmu.edu/blog/security-analytics-using-silk-and-mothra-to-identify-data-exfiltration-via-the-domain-name-service/This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data onto DNS queries.The Benefits of Cyber Assessment Training2023-03-13T00:00:00-04:002023-03-13T00:00:00-04:00Rhonda Brown, Alexander Petrillihttps://insights.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.5 Best Practices from Industry for Implementing a Zero Trust Architecture2023-03-06T00:00:00-05:002023-03-06T00:00:00-05:00Matthew Nicolai, Nathaniel Richmond, Timothy Morrowhttps://insights.sei.cmu.edu/blog/5-best-practices-from-industry-for-implementing-a-zero-trust-architecture/This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.An Acquisition Security Framework for Supply Chain Risk Management2022-10-17T00:00:00-04:002022-10-17T00:00:00-04:00Carol Woodyhttps://insights.sei.cmu.edu/blog/an-acquisition-security-framework-for-supply-chain-risk-management/This post introduces the Acquisition Security Framework (ASF), which helps organizations identify the critical touchpoints needed for effective supply chain risk management.Using Alternate Data Streams in the Collection and Exfiltration of Data2022-09-19T00:00:00-04:002022-09-19T00:00:00-04:00Dustin Updyke, Molly Jaconskihttps://insights.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.The Zero Trust Journey: 4 Phases of Implementation2022-06-27T00:00:00-04:002022-06-27T00:00:00-04:00Timothy Morrow, Matthew Nicolaihttps://insights.sei.cmu.edu/blog/the-zero-trust-journey-4-phases-of-implementation/This post outlines four phases that organizations should address as they develop and assess their roadmap and associated artifacts against a zero trust maturity model.Security Analytics: Tracking Software Updates2022-06-21T00:00:00-04:002022-06-21T00:00:00-04:00Timothy Shimeallhttps://insights.sei.cmu.edu/blog/security-analytics-tracking-software-updates/This blog post presents an analytic for tracking software updates from official vendor locations.Security Analytics: Tracking Proxy Bypass2022-04-25T00:00:00-04:002022-04-25T00:00:00-04:00Timothy Shimeallhttps://insights.sei.cmu.edu/blog/security-analytics-tracking-proxy-bypass/This post describes how to track the amount of network traffic that is evading security proxies for services that such proxies are expected to cover.A Cybersecurity Engineering Strategy for DevSecOps that Integrates with the Software Supply Chain2022-01-31T00:00:00-05:002022-01-31T00:00:00-05:00Carol Woodyhttps://insights.sei.cmu.edu/blog/a-cybersecurity-engineering-strategy-for-devsecops-that-integrates-with-the-software-supply-chain/Reused code contains defects unknown to the new user, which, in turn, propagate vulnerabilities into new systems. Organizations must develop a cybersecurity engineering strategy that addresses the integration of DevSecOps with the software supply chain.How Do You Trust AI Cybersecurity Devices?2022-01-24T00:00:00-05:002022-01-24T00:00:00-05:00Grant Deffenbaugh, Shing-hon Lauhttps://insights.sei.cmu.edu/blog/how-do-you-trust-ai-cybersecurity-devices/AI and ML cybersecurity devices are gaining traction, but efficacy testing has not kept up. We are seeking input on our test environment for these devices.DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring2021-08-09T00:00:00-04:002021-08-09T00:00:00-04:00Sean Hutchisonhttps://insights.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring of DoH.Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment2021-03-08T00:00:00-05:002021-03-08T00:00:00-05:00Geoff Sandershttps://insights.sei.cmu.edu/blog/zero-trust-adoption-managing-risk-with-cybersecurity-engineering-and-adaptive-risk-assessment/This SEI blog post provides an overview of zero trust and management of its risk with SEI's cybersecurity engineering assessment framework.Six Key Cybersecurity Engineering Activities for Building a Cybersecurity Strategy2021-02-01T00:00:00-05:002021-02-01T00:00:00-05:00Carol Woody, Rita Creelhttps://insights.sei.cmu.edu/blog/six-key-cybersecurity-engineering-activities-for-building-a-cybersecurity-strategy/This SEI Blog post highlights the importance of cybersecurity strategy in designing and integrating technology for mission success under attack.System Resilience Part 7: 16 Guiding Principles for System Resilience2020-04-27T00:00:00-04:002020-04-27T00:00:00-04:00Donald Firesmithhttps://insights.sei.cmu.edu/blog/system-resilience-part-7-16-guiding-principles-for-system-resilience/Adverse events and conditions can disrupt a system, causing it to fail to provide essential capabilities and services. As I outlined in previous posts in this series, resilience is an essential quality attribute....