SEI Insights

SEI Blog

The Latest Research in Software Engineering and Cybersecurity

Search Results

Results matching “/tools”

 10 Recommended Practices for Achieving Agile at Scale

By Kevin Fall Deputy Director, Research, and CTOSEIThis is the second installment of two blog posts highlighting recommended practices for achieving Agile at Scale that was originally published on the Cyber Security & Information Systems Information Analysis Center (CSIAC) website....

 10 Recommended Practices for Achieving Agile at Scale

This post is the first in a two-part series highlighting 10 recommended practices for achieving agile at scale. Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how...

The SEI Blog continues to attract an ever-increasing number of readers interested in learning more about our work in agile metrics, high-performance computing, malware analysis, testing, and other topics. As we reach the mid-year point, this blog posting highlights our...

Software and acquisition professionals often have questions about recommended practices related to modern software development methods, techniques, and tools, such as how to apply agile methods in government acquisition frameworks, systematic verification and validation of safety-critical systems, and operational risk...

This post was co-authored by Bill Nichols. Mitre's Top 25 Most Dangerous Software Errors is a list that details quality problems, as well as security problems. This list aims to help software developers "prevent the kinds of vulnerabilities that plague...

 Top 10 CERT/CC Blog Posts on Vulnerabilities and SSL Tools

In 2014, approximately 1 billion records of personably identifiable information were compromised as a result of cybersecurity vulnerabilities. In the face of this onslaught of compromises, it is important to examine fundamental insecurities that CERT researchers have identified and that...

 An Enhanced Tool for Securing Android Apps

This blog post was co-authored by Will Klieber. Each software application installed on a mobile smartphone, whether a new app or an update, can introduce new, unintentional vulnerabilities or malicious code. These problems can lead to security challenges for organizations...

 A Five-Year Technical Strategic Plan for the SEI

The Department of Defense (DoD) and other government agencies increasingly rely on software and networked software systems. As one of over 40 federally funded research and development centers sponsored by the United States government, Carnegie Mellon University's Software Engineering Institute...

 The 2014 Year in Review: Top 10 Blog Posts

In 2014, the SEI blog has experienced unprecedented growth, with visitors in record numbers learning more about our work in big data, secure coding for Android, malware analysis, Heartbleed, and V Models for Testing. In 2014 (through December 21), the...

Continuous delivery practices, popularized in Jez Humble's 2010 book Continuous Delivery, enable rapid and reliable software system deployment by emphasizing the need for automated testing and building, as well as closer cooperation between developers and delivery teams. As part of...



List All Blog Categories