News

Software Engineering Institute (SEI) is marking 40 years as a cornerstone of advancing software as a strategic advantage for ...
The 15th practice described in the newly released edition of the Common Sense Guide to Mitigating Insider Threats is Practice 15: Enforce separation of duties and least privilege. In this post, I ...
This post summarizes the benefits, practices, and tools for using a modeling language and compares the capabilities of SysML and AADL for use in model-based systems engineering (MBSE).
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
Since its inception in 1984, the SEI has worked to make software do more, be more secure, deploy faster, and cost less; improving software systems vital to national defense and the broader information ...
Researchers, vendors, and government bodies gathered to share solutions for implementing a zero trust architecture.
This post explores the relationship between DevSecOps and value stream mapping, both of which are rooted in the Lean approach to systems and workflow. It also provides guidance on preparing to conduct ...
A deepfake is a media file—image, video, or speech, typically representing a human subject—that has been altered deceptively using deep neural networks (DNNs) to alter a person’s identity. This ...
If you design, develop, or manage large software systems (or plan to do so), you will find Software Architecture in Practice, Third Edition to be a valuable resource for getting up to speed on the ...
As a vulnerability analyst at the CERT Coordination Center, I am interested not only in software vulnerabilities themselves, but also exploits and exploit mitigations.
This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.