News

Software Engineering Institute (SEI) is marking 40 years as a cornerstone of advancing software as a strategic advantage for ...
The 15th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 15: Enforce separation of duties and least privilege. In this post, I ...
This post summarizes the benefits, practices, and tools for using a modeling language and compares the capabilities of SysML and AADL for use in model-based systems engineering (MBSE).
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
The DevSecOps Platform-Independent Model gives instructions on creating, maintaining, and evolving DevSecOps pipelines.
Researchers, vendors, and government bodies gathered to share solutions for implementing a zero trust architecture.
A collaboration with the Institute for Defense Analyses (IDA) helped the Office of the Director, Operational Test and Evaluation (DOT&E) research and analyze software and cybersecurity issues to ...
This post explores the relationship between DevSecOps and value stream mapping, both of which are rooted in the Lean approach to systems and workflow. It also provides guidance on preparing to conduct ...
A deepfake is a media file—image, video, or speech, typically representing a human subject—that has been altered deceptively using deep neural networks (DNNs) to alter a person’s identity. This ...
If you design, develop, or manage large software systems (or plan to do so), you will find Software Architecture in Practice, Third Edition to be a valuable resource for getting up to speed on the ...
As a vulnerability analyst at the CERT Coordination Center, I am interested not only in software vulnerabilities themselves, but also exploits and exploit mitigations.