Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
My Story in Computing with Sam Procter
|
Apr 24, 2024 |
Developing and Using a Software Bill of Materials Framework
|
Apr 04, 2024 |
The Importance of Diversity in Cybersecurity: Carol Ware
|
Mar 21, 2024 |
The Importance of Diversity in Software Engineering: Suzanne Miller
|
Mar 21, 2024 |
The Importance of Diversity in Artificial Intelligence: Violet Turri
|
Mar 15, 2024 |
Using Large Language Models in the National Security Realm
|
Feb 16, 2024 |
Atypical Applications of Agile and DevSecOps Principles
|
Feb 09, 2024 |
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
|
Jan 31, 2024 |
The Impact of Architecture on Cyber-Physical Systems Safety
|
Jan 24, 2024 |
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
|
Dec 14, 2023 |
The Cybersecurity of Quantum Computing: 6 Areas of Research
|
Nov 28, 2023 |
User-Centric Metrics for Agile
|
Nov 16, 2023 |
The Product Manager’s Evolving Role in Software and Systems Development
|
Nov 10, 2023 |
Measuring the Trustworthiness of AI Systems
|
Oct 12, 2023 |
Actionable Data in the DevSecOps Pipeline
|
Sep 13, 2023 |
Insider Risk Management in the Post-Pandemic Workplace
|
Sep 08, 2023 |
An Agile Approach to Independent Verification and Validation
|
Aug 09, 2023 |
Zero Trust Architecture: Best Practices Observed in Industry
|
Jul 26, 2023 |
Automating Infrastructure as Code with Ansible and Molecule
|
Jul 10, 2023 |
Identifying and Preventing the Next SolarWinds
|
Jun 20, 2023 |
A Penetration Testing Findings Repository
|
Jun 13, 2023 |
Understanding Vulnerabilities in the Rust Programming Language
|
Jun 08, 2023 |
We Live in Software: Engineering Societal-Scale Systems
|
May 18, 2023 |
Secure by Design, Secure by Default
|
May 10, 2023 |
Key Steps to Integrate Secure by Design into Acquisition and Development
|
May 02, 2023 |
An Exploration of Enterprise Technical Debt
|
Apr 18, 2023 |
The Messy Middle of Large Language Models
|
Mar 29, 2023 |
An Infrastructure-Focused Framework for Adopting DevSecOps
|
Mar 21, 2023 |
Software Security in Rust
|
Mar 15, 2023 |
Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron
|
Feb 24, 2023 |
Asking the Right Questions to Coordinate Security in the Supply Chain
|
Feb 07, 2023 |
Securing Open Source Software in the DoD
|
Jan 26, 2023 |
A Model-Based Tool for Designing Safety-Critical Systems
|
Dec 13, 2022 |
Managing Developer Velocity and System Security with DevSecOps
|
Dec 07, 2022 |
A Method for Assessing Cloud Adoption Risks
|
Nov 17, 2022 |
Software Architecture Patterns for Deployability
|
Nov 15, 2022 |
ML-Driven Decision Making in Realistic Cyber Exercises
|
Oct 13, 2022 |
A Roadmap for Creating and Using Virtual Prototyping Software
|
Oct 06, 2022 |
Software Architecture Patterns for Robustness
|
Sep 15, 2022 |
A Platform-Independent Model for DevSecOps
|
Sep 08, 2022 |
Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems
|
Aug 18, 2022 |
Trust and AI Systems
|
Aug 05, 2022 |
A Dive into Deepfakes
|
Jul 28, 2022 |
Challenges and Metrics in Digital Engineering
|
Jul 13, 2022 |
The 4 Phases of the Zero Trust Journey
|
Jul 05, 2022 |
DevSecOps for AI Engineering
|
Jun 21, 2022 |
Undiscovered Vulnerabilities: Not Just for Critical Software
|
Jun 02, 2022 |
Explainable AI Explained
|
May 16, 2022 |
Model-Based Systems Engineering Meets DevSecOps
|
Apr 05, 2022 |
Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy
|
Mar 22, 2022 |
Software and Systems Collaboration in the Era of Smart Systems
|
Mar 09, 2022 |
Securing the Supply Chain for the Defense Industrial Base
|
Feb 22, 2022 |
Securing the Supply Chain for the Defense Industrial Base
|
Feb 22, 2022 |
Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis
|
Feb 08, 2022 |
Envisioning the Future of Software Engineering
|
Jan 20, 2022 |
Implementing the DoD's Ethical AI Principles
|
Jan 11, 2022 |
Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems
|
Dec 03, 2021 |
Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems
|
Nov 18, 2021 |
A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad
|
Nov 11, 2021 |
Enabling Transition From Sustainment to Engineering Within the DoD
|
Nov 03, 2021 |
The Silver Thread of Cyber in the Global Supply Chain
|
Oct 25, 2021 |
Measuring DevSecOps: The Way Forward
|
Oct 15, 2021 |
Bias in AI: Impact, Challenges, and Opportunities
|
Sep 23, 2021 |
My Story in Computing with Rachel Dzombak
|
Sep 17, 2021 |
Agile Strategic Planning: Concepts and Methods for Success
|
Sep 09, 2021 |
Applying Scientific Methods in Cybersecurity
|
Aug 24, 2021 |
Zero Trust Adoption: Benefits, Applications, and Resources
|
Aug 13, 2021 |
Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions
|
Aug 06, 2021 |
11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
|
Jul 29, 2021 |
Benefits and Challenges of Model-Based Systems Engineering
|
Jul 23, 2021 |
Fostering Diversity in Software Engineering
|
Jul 16, 2021 |
Can DevSecOps Make Developers Happier?
|
Jun 24, 2021 |
Is Your Organization Ready for AI?
|
Jun 22, 2021 |
My Story in Computing with Marisa Midler
|
Jun 11, 2021 |
Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems
|
Jun 04, 2021 |
AI Workforce Development
|
May 20, 2021 |
Moving from DevOps to DevSecOps
|
May 13, 2021 |
My Story in Computing with David Zubrow
|
Apr 29, 2021 |
Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs
|
Apr 23, 2021 |
My Story in Computing with Carol Smith
|
Apr 09, 2021 |
Digital Engineering and DevSecOps
|
Mar 16, 2021 |
A 10-Step Framework for Managing Risk
|
Mar 09, 2021 |
7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts
|
Feb 23, 2021 |
Ransomware: Evolution, Rise, and Response
|
Feb 16, 2021 |
VINCE: A Software Vulnerability Coordination Platform
|
Jan 21, 2021 |
Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network
|
Jan 06, 2021 |
An Introduction to CMMC Assessment Guides
|
Dec 08, 2020 |
The CMMC Level 3 Assessment Guide: A Closer Look
|
Dec 07, 2020 |
The CMMC Level 1 Assessment Guide: A Closer Look
|
Dec 07, 2020 |
Achieving Continuous Authority to Operate (ATO)
|
Nov 24, 2020 |
Challenging the Myth of the 10x Programmer
|
Nov 09, 2020 |
A Stakeholder-Specific Approach to Vulnerability Management
|
Oct 27, 2020 |
Optimizing Process Maturity in CMMC Level 5
|
Oct 13, 2020 |
Reviewing and Measuring Activities for Effectiveness in CMMC Level 4
|
Oct 07, 2020 |
Situational Awareness for Cybersecurity: Beyond the Network
|
Sep 30, 2020 |
Quantum Computing: The Quantum Advantage
|
Sep 17, 2020 |
CMMC Scoring 101
|
Sep 02, 2020 |
Developing an Effective CMMC Policy
|
Aug 17, 2020 |
The Future of Cyber: Educating the Cybersecurity Workforce
|
Aug 10, 2020 |
Documenting Process for CMMC
|
Jul 30, 2020 |
Agile Cybersecurity
|
Jul 20, 2020 |
CMMC Levels 1-3: Going Beyond NIST SP-171
|
Jul 01, 2020 |
The Future of Cyber: Secure Coding
|
Jun 15, 2020 |
Challenges to Implementing DevOps in Highly Regulated Environments
|
May 28, 2020 |
The Future of Cyber: Cybercrime
|
May 07, 2020 |
An Ethical AI Framework
|
Apr 28, 2020 |
My Story in Computing: Madison Quinn Oliver
|
Apr 13, 2020 |
The CERT Guide to Coordinated Vulnerability Disclosure
|
Mar 26, 2020 |
Women in Software and Cybersecurity: Dr. April Galyardt
|
Mar 11, 2020 |
The Future of Cyber: Security and Privacy
|
Feb 26, 2020 |
The Future of Cyber: Security and Resilience
|
Feb 14, 2020 |
Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools
|
Feb 07, 2020 |
Women in Software and Cybersecurity: Dr. Carol Woody
|
Jan 29, 2020 |
Benchmarking Organizational Incident Management Practices
|
Dec 17, 2019 |
Machine Learning in Cybersecurity: 7 Questions for Decision Makers
|
Dec 11, 2019 |
Women in Software and Cybersecurity: Kristi Roth
|
Nov 26, 2019 |
Human Factors in Software Engineering
|
Nov 12, 2019 |
Women in Software and Cybersecurity: Anita Carleton
|
Oct 15, 2019 |
Improving the Common Vulnerability Scoring System
|
Oct 04, 2019 |
Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities
|
Oct 01, 2019 |
Selecting Metrics for Software Assurance
|
Sep 24, 2019 |
AI in Humanitarian Assistance and Disaster Response
|
Sep 18, 2019 |
The AADL Error Library: 4 Families of Systems Errors
|
Aug 30, 2019 |
Women in Software and Cybersecurity: Suzanne Miller
|
Aug 22, 2019 |
Privacy in the Blockchain Era
|
Jul 29, 2019 |
Cyber Intelligence: Best Practices and Biggest Challenges
|
Jul 25, 2019 |
Assessing Cybersecurity Training
|
Jul 12, 2019 |
DevOps in Highly Regulated Environments
|
Jun 27, 2019 |
Women in Software and Cybersecurity: Dr. Ipek Ozkaya
|
Jun 20, 2019 |
The Role of the Software Factory in Acquisition and Sustainment
|
Jun 11, 2019 |
Defending Your Organization Against Business Email Compromise
|
May 30, 2019 |
My Story in Computing with Dr. Eliezer Kanal
|
May 21, 2019 |
Women in Software and Cybersecurity: Eileen Wrubel
|
Apr 19, 2019 |
Managing Technical Debt: A Focus on Automation, Design, and Architecture
|
Mar 21, 2019 |
Women in Software and Cybersecurity: Grace Lewis
|
Mar 14, 2019 |
Women in Software and Cybersecurity: Bobbie Stempfley
|
Mar 01, 2019 |
Women in Software and Cybersecurity: Dr. Lorrie Cranor
|
Mar 01, 2019 |
Leading in the Age of Artificial Intelligence
|
Mar 01, 2019 |
Applying Best Practices in Network Traffic Analysis
|
Feb 27, 2019 |
10 Types of Application Security Testing Tools and How to Use Them
|
Feb 25, 2019 |
Using Test Suites for Static Analysis Alert Classifiers
|
Feb 18, 2019 |
Blockchain at CMU and Beyond
|
Feb 18, 2019 |
Leading in the Age of Artificial Intelligence
|
Feb 15, 2019 |
Deep Learning in Depth: The Future of Deep Learning
|
Nov 28, 2018 |
Deep Learning in Depth: Adversarial Machine Learning
|
Nov 27, 2018 |
System Architecture Virtual Integration: ROI on Early Discovery of Defects
|
Nov 15, 2018 |
Deep Learning in Depth: The Importance of Diverse Perspectives
|
Nov 07, 2018 |
A Technical Strategy for Cybersecurity
|
Nov 04, 2018 |
Best Practices for Security in Cloud Computing
|
Oct 26, 2018 |
Risks, Threats, and Vulnerabilities in Moving to the Cloud
|
Oct 22, 2018 |
Deep Learning in Depth: IARPA's Functional Map of the World Challenge
|
Oct 12, 2018 |
Deep Learning in Depth: Deep Learning versus Machine Learning
|
Oct 05, 2018 |
How to Be a Network Traffic Analyst
|
Sep 14, 2018 |
Workplace Violence and Insider Threat
|
Aug 28, 2018 |
Why Does Software Cost So Much?
|
Aug 02, 2018 |
Cybersecurity Engineering & Software Assurance: Opportunities & Risks
|
Jul 26, 2018 |
Software Sustainment and Product Lines
|
Jul 10, 2018 |
Best Practices in Cyber Intelligence
|
Jun 25, 2018 |
Deep Learning in Depth: The Good, the Bad, and the Future
|
Jun 07, 2018 |
The Evolving Role of the Chief Risk Officer
|
May 24, 2018 |
Obsidian: A Safer Blockchain Programming Language
|
May 10, 2018 |
Agile DevOps
|
Apr 19, 2018 |
Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University
|
Apr 05, 2018 |
Is Software Spoiling Us? Technical Innovations in the Department of Defense
|
Mar 15, 2018 |
Is Software Spoiling Us? Innovations in Daily Life from Software
|
Feb 08, 2018 |
How Risk Management Fits into Agile & DevOps in Government
|
Feb 01, 2018 |
5 Best Practices for Preventing and Responding to Insider Threat
|
Dec 28, 2017 |
Pharos Binary Static Analysis: An Update
|
Dec 12, 2017 |
Positive Incentives for Reducing Insider Threat
|
Nov 30, 2017 |
Mission-Practical Biometrics
|
Nov 16, 2017 |
At Risk Emerging Technology Domains
|
Oct 24, 2017 |
DNS Blocking to Disrupt Malware
|
Oct 12, 2017 |
Best Practices: Network Border Protection
|
Sep 21, 2017 |
Verifying Software Assurance with IBM’s Watson
|
Sep 07, 2017 |
The CERT Software Assurance Framework
|
Aug 31, 2017 |
Scaling Agile Methods
|
Aug 03, 2017 |
Ransomware: Best Practices for Prevention and Response
|
Jul 14, 2017 |
Integrating Security in DevOps
|
Jun 29, 2017 |
SEI Fellows Series: Peter Feiler
|
Jun 15, 2017 |
NTP Best Practices
|
May 25, 2017 |
Establishing Trust in Disconnected Environments
|
May 18, 2017 |
Distributed Artificial Intelligence in Space
|
Apr 20, 2017 |
Verifying Distributed Adaptive Real-Time Systems
|
Mar 27, 2017 |
10 At-Risk Emerging Technologies
|
Mar 23, 2017 |
Technical Debt as a Core Software Engineering Practice
|
Feb 27, 2017 |
DNS Best Practices
|
Feb 23, 2017 |
Three Roles and Three Failure Patterns of Software Architects
|
Jan 26, 2017 |
Security Modeling Tools
|
Jan 12, 2017 |
Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks
|
Dec 19, 2016 |
Cyber Security Engineering for Software and Systems Assurance
|
Dec 08, 2016 |
Moving Target Defense
|
Nov 30, 2016 |
Improving Cybersecurity Through Cyber Intelligence
|
Nov 10, 2016 |
A Requirement Specification Language for AADL
|
Oct 27, 2016 |
Becoming a CISO: Formal and Informal Requirements
|
Oct 19, 2016 |
Predicting Quality Assurance with Software Metrics and Security Methods
|
Oct 13, 2016 |
Network Flow and Beyond
|
Sep 29, 2016 |
A Community College Curriculum for Secure Software Development
|
Sep 15, 2016 |
Security and the Internet of Things
|
Aug 25, 2016 |
The SEI Fellow Series: Nancy Mead
|
Aug 10, 2016 |
An Open Source Tool for Fault Tree Analysis
|
Jul 28, 2016 |
Global Value Chain – An Expanded View of the ICT Supply Chain
|
Jul 18, 2016 |
Intelligence Preparation for Operational Resilience
|
Jun 21, 2016 |
Evolving Air Force Intelligence with Agile Techniques
|
May 26, 2016 |
Threat Modeling and the Internet of Things
|
May 12, 2016 |
Open Systems Architectures: When & Where to Be Closed
|
Apr 14, 2016 |
Toward Efficient and Effective Software Sustainment
|
Mar 18, 2016 |
Effective Reduction of Avoidable Complexity in Embedded Systems
|
Mar 18, 2016 |
Quality Attribute Refinement and Allocation
|
Mar 08, 2016 |
Is Java More Secure Than C?
|
Feb 19, 2016 |
Identifying the Architectural Roots of Vulnerabilities
|
Feb 04, 2016 |
Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
|
Feb 03, 2016 |
An Interview with Grady Booch
|
Jan 12, 2016 |
Structuring the Chief Information Security Officer Organization
|
Dec 23, 2015 |
How Cyber Insurance Is Driving Risk and Technology Management
|
Nov 09, 2015 |
A Field Study of Technical Debt
|
Oct 15, 2015 |
How the University of Pittsburgh Is Using the NIST Cybersecurity Framework
|
Oct 01, 2015 |
A Software Assurance Curriculum for Future Engineers
|
Sep 24, 2015 |
Four Types of Shift Left Testing
|
Sep 10, 2015 |
Capturing the Expertise of Cybersecurity Incident Handlers
|
Aug 27, 2015 |
Toward Speed and Simplicity: Creating a Software Library for Graph Analytics
|
Aug 27, 2015 |
Improving Quality Using Architecture Fault Analysis with Confidence Arguments
|
Aug 13, 2015 |
A Taxonomy of Testing Types
|
Jul 30, 2015 |
Reducing Complexity in Software & Systems
|
Jul 16, 2015 |
Designing Security Into Software-Reliant Systems
|
Jun 25, 2015 |
Agile Methods in Air Force Sustainment
|
Jun 11, 2015 |
Defect Prioritization With the Risk Priority Number
|
May 28, 2015 |
SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers
|
May 14, 2015 |
An Introduction to Context-Aware Computing
|
Apr 23, 2015 |
Data Driven Software Assurance
|
Apr 09, 2015 |
Supply Chain Risk Management: Managing Third Party and External Dependency Risk
|
Mar 26, 2015 |
Applying Agile in the DoD: Twelfth Principle
|
Mar 26, 2015 |
Introduction to the Mission Thread Workshop
|
Mar 12, 2015 |
Applying Agile in the DoD: Eleventh Principle
|
Feb 26, 2015 |
A Workshop on Measuring What Matters
|
Feb 20, 2015 |
Applying Agile in the DoD: Tenth Principle
|
Feb 12, 2015 |
Predicting Software Assurance Using Quality and Reliability Measures
|
Jan 29, 2015 |
Applying Agile in the DoD: Ninth Principle
|
Jan 16, 2015 |
Cyber Insurance and Its Role in Mitigating Cybersecurity Risk
|
Jan 08, 2015 |
AADL and Dassault Aviation
|
Dec 18, 2014 |
Tactical Cloudlets
|
Dec 04, 2014 |
Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs
|
Nov 27, 2014 |
Coding with AADL
|
Nov 13, 2014 |
The State of Agile
|
Oct 30, 2014 |
Applying Agile in the DoD: Eighth Principle
|
Oct 09, 2014 |
A Taxonomy of Operational Risks for Cyber Security
|
Oct 07, 2014 |
Agile Metrics
|
Sep 25, 2014 |
Four Principles for Engineering Scalable, Big Data Systems
|
Sep 11, 2014 |
An Appraisal of Systems Engineering: Defense v. Non-Defense
|
Aug 28, 2014 |
HTML5 for Mobile Apps at the Edge
|
Aug 14, 2014 |
Applying Agile in the DoD: Seventh Principle
|
Jul 24, 2014 |
AADL and Edgewater
|
Jul 10, 2014 |
Security and Wireless Emergency Alerts
|
Jun 26, 2014 |
Safety and Behavior Specification Using the Architecture Analysis and Design Language
|
Jun 12, 2014 |
Characterizing and Prioritizing Malicious Code
|
May 29, 2014 |
Applying Agile in the DoD: Sixth Principle
|
May 29, 2014 |
Using Quality Attributes to Improve Acquisition
|
May 15, 2014 |
Best Practices for Trust in the Wireless Emergency Alerts Service
|
Apr 29, 2014 |
Three Variations on the V Model for System and Software Testing
|
Apr 10, 2014 |
Adapting the PSP to Incorporate Verified Design by Contract
|
Mar 27, 2014 |
Comparing IT Risk Assessment and Analysis Methods
|
Mar 25, 2014 |
AADL and Aerospace
|
Mar 13, 2014 |
Assuring Open Source Software
|
Feb 27, 2014 |
Security Pattern Assurance through Roundtrip Engineering
|
Feb 13, 2014 |
The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
|
Feb 11, 2014 |
Applying Agile in the DoD: Fifth Principle
|
Jan 30, 2014 |
Software Assurance Cases
|
Jan 16, 2014 |
Raising the Bar - Mainstreaming CERT C Secure Coding Rules
|
Jan 07, 2014 |
AADL and Télécom Paris Tech
|
Dec 26, 2013 |
From Process to Performance-Based Improvement
|
Dec 12, 2013 |
An Approach to Managing the Software Engineering Challenges of Big Data
|
Nov 27, 2013 |
Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience
|
Nov 26, 2013 |
Situational Awareness Mashups
|
Nov 14, 2013 |
Applying Agile in the DoD: Fourth Principle
|
Oct 31, 2013 |
Architecting Systems of the Future
|
Oct 17, 2013 |
Acquisition Archetypes
|
Sep 26, 2013 |
Human-in-the-Loop Autonomy
|
Sep 12, 2013 |
Mobile Applications for Emergency Managers
|
Aug 29, 2013 |
Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions
|
Aug 27, 2013 |
Applying Agile in the DoD: Third Principle
|
Aug 15, 2013 |
DevOps - Transform Development and Operations for Fast, Secure Deployments
|
Jul 30, 2013 |
Application Virtualization as a Strategy for Cyber Foraging
|
Jul 25, 2013 |
Common Testing Problems: Pitfalls to Prevent and Mitigate
|
Jul 11, 2013 |
Joint Programs and Social Dilemmas
|
Jun 27, 2013 |
Applying Agile in the DoD: Second Principle
|
Jun 13, 2013 |
Managing Disruptive Events - CERT-RMM Experience Reports
|
Jun 11, 2013 |
Reliability Validation and Improvement Framework
|
May 23, 2013 |
The Business Case for Systems Engineering
|
May 09, 2013 |
Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity
|
May 09, 2013 |
Applying Agile in the DoD: First Principle
|
Apr 18, 2013 |
The Evolution of a Science Project
|
Apr 04, 2013 |
Securing Mobile Devices aka BYOD
|
Mar 26, 2013 |
What's New With Version 2 of the AADL Standard?
|
Mar 21, 2013 |
The State of the Practice of Cyber Intelligence
|
Mar 07, 2013 |
Mitigating Insider Threat - New and Improved Practices Fourth Edition
|
Feb 28, 2013 |
Technology Readiness Assessments
|
Feb 21, 2013 |
Standards in Cloud Computing Interoperability
|
Feb 07, 2013 |
Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk
|
Jan 31, 2013 |
The Latest Developments in AADL
|
Jan 17, 2013 |
The Fundamentals of Agile
|
Jan 03, 2013 |
Software for Soldiers who use Smartphones
|
Dec 20, 2012 |
Managing Disruptive Events: Making the Case for Operational Resilience
|
Dec 19, 2012 |
Architecting Service-Oriented Systems
|
Dec 06, 2012 |
The SEI Strategic Plan
|
Nov 15, 2012 |
Quantifying Uncertainty in Early Lifecycle Cost Estimation
|
Nov 01, 2012 |
Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities
|
Oct 23, 2012 |
Architecting a Financial System with TSP
|
Oct 18, 2012 |
The Importance of Data Quality
|
Oct 04, 2012 |
How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them
|
Sep 25, 2012 |
Misaligned Incentives
|
Sep 20, 2012 |
Cloud Computing for the Battlefield
|
Sep 04, 2012 |
An Architecture-Focused Measurement Framework for Managing Technical Debt
|
Sep 04, 2012 |
Agile Acquisition
|
Sep 04, 2012 |
How a Disciplined Process Enhances & Enables Agility
|
Sep 04, 2012 |
U.S. Postal Inspection Service Use of the CERT Resilience Management Model
|
Aug 21, 2012 |
Insights from the First CERT Resilience Management Model Users Group
|
Jul 17, 2012 |
NIST Catalog of Security and Privacy Controls, Including Insider Threat
|
Apr 24, 2012 |
Cisco's Adoption of CERT Secure Coding Standards
|
Feb 28, 2012 |
How to Become a Cyber Warrior
|
Jan 31, 2012 |
Considering Security and Privacy in the Move to Electronic Health Records
|
Dec 20, 2011 |
Measuring Operational Resilience
|
Oct 04, 2011 |
Why Organizations Need a Secure Domain Name System
|
Sep 06, 2011 |
Controls for Monitoring the Security of Cloud Services
|
Aug 02, 2011 |
Building a Malware Analysis Capability
|
Jul 12, 2011 |
Using the Smart Grid Maturity Model (SGMM)
|
May 05, 2011 |
Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM
|
Mar 29, 2011 |
Conducting Cyber Exercises at the National Level
|
Feb 22, 2011 |
Indicators and Controls for Mitigating Insider Threat
|
Jan 25, 2011 |
How Resilient Is My Organization?
|
Dec 09, 2010 |
Public-Private Partnerships: Essential for National Cyber Security
|
Nov 30, 2010 |
Software Assurance: A Master's Level Curriculum
|
Oct 26, 2010 |
How to Develop More Secure Software - Practices from Thirty Organizations
|
Sep 28, 2010 |
Mobile Device Security: Threats, Risks, and Actions to Take
|
Aug 31, 2010 |
Establishing a National Computer Security Incident Response Team (CSIRT)
|
Aug 19, 2010 |
Securing Industrial Control Systems
|
Jul 27, 2010 |
The Power of Fuzz Testing to Reduce Security Vulnerabilities
|
May 25, 2010 |
Protect Your Business from Money Mules
|
Apr 27, 2010 |
Train for the Unexpected
|
Mar 03, 2010 |
The Role of the CISO in Developing More Secure Software
|
Mar 02, 2010 |
Computer and Network Forensics: A Master's Level Curriculum
|
Feb 02, 2010 |
Introducing the Smart Grid Maturity Model (SGMM)
|
Jan 12, 2010 |
Leveraging Security Policies and Procedures for Electronic Evidence Discovery
|
Jan 09, 2010 |
Integrating Privacy Practices into the Software Development Life Cycle
|
Dec 22, 2009 |
Using the Facts to Protect Enterprise Networks: CERT's NetSA Team
|
Dec 01, 2009 |
Ensuring Continuity of Operations When Business Is Disrupted
|
Nov 10, 2009 |
Managing Relationships with Business Partners to Achieve Operational Resiliency
|
Oct 20, 2009 |
The Smart Grid: Managing Electrical Power Distribution and Use
|
Sep 29, 2009 |
Electronic Health Records: Challenges for Patient Privacy and Security
|
Sep 08, 2009 |
Mitigating Insider Threat: New and Improved Practices
|
Aug 18, 2009 |
Rethinking Risk Management
|
Jul 07, 2009 |
The Upside and Downside of Security in the Cloud
|
Jun 16, 2009 |
More Targeted, Sophisticated Attacks: Where to Pay Attention
|
May 26, 2009 |
Is There Value in Identifying Software Security "Never Events?"
|
May 05, 2009 |
Cyber Security, Safety, and Ethics for the Net Generation
|
Apr 14, 2009 |
An Experience-Based Maturity Model for Software Security
|
Mar 31, 2009 |
Mainstreaming Secure Coding Practices
|
Mar 17, 2009 |
Security: A Key Enabler of Business Innovation
|
Mar 03, 2009 |
Better Incident Response Through Scenario Based Training
|
Feb 17, 2009 |
An Alternative to Risk Management for Information and Software Security
|
Feb 03, 2009 |
Tackling Tough Challenges: Insights from CERT’s Director Rich Pethia
|
Jan 20, 2009 |
Climate Change: Implications for Information Technology and Security
|
Dec 09, 2008 |
Using High Fidelity, Online Training to Stay Sharp
|
Nov 25, 2008 |
Integrating Security Incident Response and e-Discovery
|
Nov 11, 2008 |
Concrete Steps for Implementing an Information Security Program
|
Oct 28, 2008 |
Virtual Communities: Risks and Opportunities
|
Oct 14, 2008 |
Developing Secure Software: Universities as Supply Chain Partners
|
Sep 30, 2008 |
Security Risk Assessment Using OCTAVE Allegro
|
Sep 16, 2008 |
Getting to a Useful Set of Security Metrics
|
Sep 02, 2008 |
How to Start a Secure Software Development Program
|
Aug 20, 2008 |
Managing Risk to Critical Infrastructures at the National Level
|
Aug 05, 2008 |
Analyzing Internet Traffic for Better Cyber Situational Awareness
|
Jul 28, 2008 |
Managing Security Vulnerabilities Based on What Matters Most
|
Jul 22, 2008 |
Identifying Software Security Requirements Early, Not After the Fact
|
Jul 08, 2008 |
Making Information Security Policy Happen
|
Jun 24, 2008 |
Becoming a Smart Buyer of Software
|
Jun 10, 2008 |
Building More Secure Software
|
May 27, 2008 |
Connecting the Dots Between IT Operations and Security
|
May 13, 2008 |
Getting in Front of Social Engineering
|
Apr 29, 2008 |
Using Benchmarks to Make Better Security Decisions
|
Apr 15, 2008 |
Protecting Information Privacy - How To and Lessons Learned
|
Apr 01, 2008 |
Initiating a Security Metrics Program: Key Points to Consider
|
Mar 18, 2008 |
Insider Threat and the Software Development Life Cycle
|
Mar 04, 2008 |
Tackling the Growing Botnet Threat
|
Feb 19, 2008 |
Building a Security Metrics Program
|
Feb 05, 2008 |
Inadvertent Data Disclosure on Peer-to-Peer Networks
|
Jan 22, 2008 |
Information Compliance: A Growing Challenge for Business Leaders
|
Jan 08, 2008 |
Internal Audit's Role in Information Security: An Introduction
|
Dec 10, 2007 |
What Business Leaders Can Expect from Security Degree Programs
|
Nov 27, 2007 |
The Path from Information Security Risk Assessment to Compliance
|
Nov 13, 2007 |
Computer Forensics for Business Leaders: Building Robust Policies and Processes
|
Oct 30, 2007 |
Business Resilience: A More Compelling Argument for Information Security
|
Oct 16, 2007 |
Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity
|
Oct 15, 2007 |
The Human Side of Security Trade-Offs
|
Sep 18, 2007 |
Dual Perspectives: A CIO's and CISO's Take on Security
|
Sep 04, 2007 |
Reducing Security Costs with Standard Configurations: U.S. Government Initiatives
|
Aug 07, 2007 |
Tackling Security at the National Level: A Resource for Leaders
|
Aug 07, 2007 |
Real-World Security for Business Leaders
|
Jul 24, 2007 |
Using Standards to Build an Information Security Program
|
Jul 10, 2007 |
Getting Real About Security Governance
|
Jun 26, 2007 |
Convergence: Integrating Physical and IT Security
|
Jun 12, 2007 |
IT Infrastructure: Tips for Navigating Tough Spots
|
May 29, 2007 |
The Value of De-Identified Personal Data
|
May 15, 2007 |
Adapting to Changing Risk Environments: Operational Resilience
|
May 01, 2007 |
Computer Forensics for Business Leaders: A Primer
|
Apr 17, 2007 |
The Real Secrets of Incident Management
|
Apr 03, 2007 |
The Legal Side of Global Security
|
Mar 20, 2007 |
A New Look at the Business of IT Education
|
Mar 06, 2007 |
Crisis Communications During a Security Incident
|
Feb 20, 2007 |
Assuring Mission Success in Complex Environments
|
Feb 06, 2007 |
Privacy: The Slow Tipping Point
|
Jan 23, 2007 |
Building Staff Competence in Security
|
Jan 09, 2007 |
Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology
|
Dec 26, 2006 |
Inside Defense-in-Depth
|
Dec 19, 2006 |
Protecting Against Insider Threat
|
Nov 28, 2006 |
Change Management: The Security 'X' Factor
|
Nov 14, 2006 |
CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT
|
Oct 31, 2006 |
Proactive Remedies for Rising Threats
|
Oct 17, 2006 |
Why Leaders Should Care About Security
|
Oct 17, 2006 |
Compliance vs. Buy-in
|
Oct 17, 2006 |
The ROI of Security
|
Oct 17, 2006 |