
Blog Posts
The Benefits of Cyber Assessment Training
This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.
• By Rhonda Brown, Alexander Petrilli
In Cybersecurity Engineering


5 Best Practices from Industry for Implementing a Zero Trust Architecture
This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.
• By Matthew Nicolai, Nathaniel Richmond, Timothy Morrow
In Cybersecurity Engineering


An Acquisition Security Framework for Supply Chain Risk Management
This post introduces the Acquisition Security Framework (ASF), which helps organizations identify the critical touchpoints needed for effective supply chain risk management.
• By Carol Woody
In Cybersecurity Engineering

Using Alternate Data Streams in the Collection and Exfiltration of Data
In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.
• By Dustin Updyke, Molly Jaconski
In Cybersecurity Engineering


Security Analytics: Tracking Software Updates
This blog post presents an analytic for tracking software updates from official vendor locations.
• By Tim Shimeall
In Cybersecurity Engineering

Security Analytics: Tracking Proxy Bypass
This post describes how to track the amount of network traffic that is evading security proxies for services that such proxies are expected to cover.
• By Tim Shimeall
In Cybersecurity Engineering

A Cybersecurity Engineering Strategy for DevSecOps that Integrates with the Software Supply Chain
Reused code contains defects unknown to the new user, which, in turn, propagate vulnerabilities into new systems. Organizations must develop a cybersecurity engineering strategy that addresses the integration of DevSecOps …
• By Carol Woody
In Cybersecurity Engineering

How Do You Trust AI Cybersecurity Devices?
AI and ML cybersecurity devices are gaining traction, but efficacy testing has not kept up. We are seeking input on our test environment for these devices.
• By Shing-hon Lau, Grant Deffenbaugh
In Cybersecurity Engineering


DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring
DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring …
• By Sean Hutchison
In Cybersecurity Engineering

Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment
In this and a series of future posts, we provide an overview of zero trust and management of its risk with SEI's cybersecurity engineering assessment framework. This adaptive framework incorporates …
• By Geoff Sanders
In Cybersecurity Engineering
