Software Engineering Institute (SEI) Podcast Series

By Members of Technical Staff at the Software Engineering Institute

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 125
Reviews: 0
Episodes: 419

Description

The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.

Episode Date
My Story in Computing with Sam Procter
Apr 24, 2024
Developing and Using a Software Bill of Materials Framework
Apr 04, 2024
The Importance of Diversity in Cybersecurity: Carol Ware
Mar 21, 2024
The Importance of Diversity in Software Engineering: Suzanne Miller
Mar 21, 2024
The Importance of Diversity in Artificial Intelligence: Violet Turri
Mar 15, 2024
Using Large Language Models in the National Security Realm
Feb 16, 2024
Atypical Applications of Agile and DevSecOps Principles
Feb 09, 2024
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
Jan 31, 2024
The Impact of Architecture on Cyber-Physical Systems Safety
Jan 24, 2024
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
Dec 14, 2023
The Cybersecurity of Quantum Computing: 6 Areas of Research
Nov 28, 2023
User-Centric Metrics for Agile
Nov 16, 2023
The Product Manager’s Evolving Role in Software and Systems Development
Nov 10, 2023
Measuring the Trustworthiness of AI Systems
Oct 12, 2023
Actionable Data in the DevSecOps Pipeline
Sep 13, 2023
Insider Risk Management in the Post-Pandemic Workplace
Sep 08, 2023
An Agile Approach to Independent Verification and Validation
Aug 09, 2023
Zero Trust Architecture: Best Practices Observed in Industry
Jul 26, 2023
Automating Infrastructure as Code with Ansible and Molecule
Jul 10, 2023
Identifying and Preventing the Next SolarWinds
Jun 20, 2023
A Penetration Testing Findings Repository
Jun 13, 2023
Understanding Vulnerabilities in the Rust Programming Language
Jun 08, 2023
We Live in Software: Engineering Societal-Scale Systems
May 18, 2023
Secure by Design, Secure by Default
May 10, 2023
Key Steps to Integrate Secure by Design into Acquisition and Development
May 02, 2023
An Exploration of Enterprise Technical Debt
Apr 18, 2023
The Messy Middle of Large Language Models
Mar 29, 2023
An Infrastructure-Focused Framework for Adopting DevSecOps
Mar 21, 2023
Software Security in Rust
Mar 15, 2023
Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron
Feb 24, 2023
Asking the Right Questions to Coordinate Security in the Supply Chain
Feb 07, 2023
Securing Open Source Software in the DoD
Jan 26, 2023
A Model-Based Tool for Designing Safety-Critical Systems
Dec 13, 2022
Managing Developer Velocity and System Security with DevSecOps
Dec 07, 2022
A Method for Assessing Cloud Adoption Risks
Nov 17, 2022
Software Architecture Patterns for Deployability
Nov 15, 2022
ML-Driven Decision Making in Realistic Cyber Exercises
Oct 13, 2022
A Roadmap for Creating and Using Virtual Prototyping Software
Oct 06, 2022
Software Architecture Patterns for Robustness
Sep 15, 2022
A Platform-Independent Model for DevSecOps
Sep 08, 2022
Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems
Aug 18, 2022
Trust and AI Systems
Aug 05, 2022
A Dive into Deepfakes
Jul 28, 2022
Challenges and Metrics in Digital Engineering
Jul 13, 2022
The 4 Phases of the Zero Trust Journey
Jul 05, 2022
DevSecOps for AI Engineering
Jun 21, 2022
Undiscovered Vulnerabilities: Not Just for Critical Software
Jun 02, 2022
Explainable AI Explained
May 16, 2022
Model-Based Systems Engineering Meets DevSecOps
Apr 05, 2022
Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy
Mar 22, 2022
Software and Systems Collaboration in the Era of Smart Systems
Mar 09, 2022
Securing the Supply Chain for the Defense Industrial Base
Feb 22, 2022
Securing the Supply Chain for the Defense Industrial Base
Feb 22, 2022
Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis
Feb 08, 2022
Envisioning the Future of Software Engineering
Jan 20, 2022
Implementing the DoD's Ethical AI Principles
Jan 11, 2022
Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems
Dec 03, 2021
Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems
Nov 18, 2021
A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad
Nov 11, 2021
Enabling Transition From Sustainment to Engineering Within the DoD
Nov 03, 2021
The Silver Thread of Cyber in the Global Supply Chain
Oct 25, 2021
Measuring DevSecOps: The Way Forward
Oct 15, 2021
Bias in AI: Impact, Challenges, and Opportunities
Sep 23, 2021
My Story in Computing with Rachel Dzombak
Sep 17, 2021
Agile Strategic Planning: Concepts and Methods for Success
Sep 09, 2021
Applying Scientific Methods in Cybersecurity
Aug 24, 2021
Zero Trust Adoption: Benefits, Applications, and Resources
Aug 13, 2021
Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions 
Aug 06, 2021
11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula 

Jul 29, 2021
Benefits and Challenges of Model-Based Systems Engineering
Jul 23, 2021
Fostering Diversity in Software Engineering
Jul 16, 2021
Can DevSecOps Make Developers Happier?
Jun 24, 2021
Is Your Organization Ready for AI?
Jun 22, 2021
My Story in Computing with Marisa Midler
Jun 11, 2021
Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems
Jun 04, 2021
AI Workforce Development
May 20, 2021
Moving from DevOps to DevSecOps
May 13, 2021
My Story in Computing with David Zubrow
Apr 29, 2021
Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs
Apr 23, 2021
My Story in Computing with Carol Smith
Apr 09, 2021
Digital Engineering and DevSecOps
Mar 16, 2021
A 10-Step Framework for Managing Risk
Mar 09, 2021
7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts
Feb 23, 2021
Ransomware: Evolution, Rise, and Response
Feb 16, 2021
VINCE: A Software Vulnerability Coordination Platform
Jan 21, 2021
Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network

Jan 06, 2021
An Introduction to CMMC Assessment Guides
Dec 08, 2020
The CMMC Level 3 Assessment Guide: A Closer Look
Dec 07, 2020
The CMMC Level 1 Assessment Guide: A Closer Look
Dec 07, 2020
Achieving Continuous Authority to Operate (ATO)
Nov 24, 2020
Challenging the Myth of the 10x Programmer
Nov 09, 2020
A Stakeholder-Specific Approach to Vulnerability Management
Oct 27, 2020
Optimizing Process Maturity in CMMC Level 5
Oct 13, 2020
Reviewing and Measuring Activities for Effectiveness in CMMC Level 4
Oct 07, 2020
Situational Awareness for Cybersecurity: Beyond the Network
Sep 30, 2020
Quantum Computing: The Quantum Advantage
Sep 17, 2020
CMMC Scoring 101
Sep 02, 2020
Developing an Effective CMMC Policy
Aug 17, 2020
The Future of Cyber: Educating the Cybersecurity Workforce
Aug 10, 2020
Documenting Process for CMMC
Jul 30, 2020
Agile Cybersecurity
Jul 20, 2020
CMMC Levels 1-3: Going Beyond NIST SP-171
Jul 01, 2020
The Future of Cyber: Secure Coding
Jun 15, 2020
Challenges to Implementing DevOps in Highly Regulated Environments
May 28, 2020
The Future of Cyber: Cybercrime
May 07, 2020
An Ethical AI Framework
Apr 28, 2020
My Story in Computing: Madison Quinn Oliver
Apr 13, 2020
The CERT Guide to Coordinated Vulnerability Disclosure
Mar 26, 2020
Women in Software and Cybersecurity: Dr. April Galyardt
Mar 11, 2020
The Future of Cyber: Security and Privacy
Feb 26, 2020
The Future of Cyber: Security and Resilience
Feb 14, 2020
Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools
Feb 07, 2020
Women in Software and Cybersecurity: Dr. Carol Woody
Jan 29, 2020
Benchmarking Organizational Incident Management Practices
Dec 17, 2019
Machine Learning in Cybersecurity: 7 Questions for Decision Makers
Dec 11, 2019
Women in Software and Cybersecurity: Kristi Roth
Nov 26, 2019
Human Factors in Software Engineering
Nov 12, 2019
Women in Software and Cybersecurity: Anita Carleton
Oct 15, 2019
Improving the Common Vulnerability Scoring System
Oct 04, 2019
Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities
Oct 01, 2019
Selecting Metrics for Software Assurance
Sep 24, 2019
AI in Humanitarian Assistance and Disaster Response
Sep 18, 2019
The AADL Error Library: 4 Families of Systems Errors
Aug 30, 2019
Women in Software and Cybersecurity: Suzanne Miller
Aug 22, 2019
Privacy in the Blockchain Era
Jul 29, 2019
Cyber Intelligence: Best Practices and Biggest Challenges
Jul 25, 2019
Assessing Cybersecurity Training
Jul 12, 2019
DevOps in Highly Regulated Environments
Jun 27, 2019
Women in Software and Cybersecurity: Dr. Ipek Ozkaya
Jun 20, 2019
The Role of the Software Factory in Acquisition and Sustainment
Jun 11, 2019
Defending Your Organization Against Business Email Compromise
May 30, 2019
My Story in Computing with Dr. Eliezer Kanal
May 21, 2019
Women in Software and Cybersecurity: Eileen Wrubel
Apr 19, 2019
Managing Technical Debt: A Focus on Automation, Design, and Architecture
Mar 21, 2019
Women in Software and Cybersecurity: Grace Lewis
Mar 14, 2019
Women in Software and Cybersecurity: Bobbie Stempfley
Mar 01, 2019
Women in Software and Cybersecurity: Dr. Lorrie Cranor
Mar 01, 2019
Leading in the Age of Artificial Intelligence
Mar 01, 2019
Applying Best Practices in Network Traffic Analysis
Feb 27, 2019
10 Types of Application Security Testing Tools and How to Use Them
Feb 25, 2019
Using Test Suites for Static Analysis Alert Classifiers
Feb 18, 2019
Blockchain at CMU and Beyond
Feb 18, 2019
Leading in the Age of Artificial Intelligence
Feb 15, 2019
Deep Learning in Depth: The Future of Deep Learning
Nov 28, 2018
Deep Learning in Depth: Adversarial Machine Learning
Nov 27, 2018
System Architecture Virtual Integration: ROI on Early Discovery of Defects
Nov 15, 2018
Deep Learning in Depth: The Importance of Diverse Perspectives
Nov 07, 2018
A Technical Strategy for Cybersecurity
Nov 04, 2018
Best Practices for Security in Cloud Computing
Oct 26, 2018
Risks, Threats, and Vulnerabilities in Moving to the Cloud
Oct 22, 2018
Deep Learning in Depth: IARPA's Functional Map of the World Challenge
Oct 12, 2018
Deep Learning in Depth: Deep Learning versus Machine Learning
Oct 05, 2018
How to Be a Network Traffic Analyst
Sep 14, 2018
Workplace Violence and Insider Threat
Aug 28, 2018
Why Does Software Cost So Much?
Aug 02, 2018
Cybersecurity Engineering & Software Assurance: Opportunities & Risks
Jul 26, 2018
Software Sustainment and Product Lines
Jul 10, 2018
Best Practices in Cyber Intelligence
Jun 25, 2018
Deep Learning in Depth: The Good, the Bad, and the Future
Jun 07, 2018
The Evolving Role of the Chief Risk Officer
May 24, 2018
Obsidian: A Safer Blockchain Programming Language
May 10, 2018
Agile DevOps
Apr 19, 2018
Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University
Apr 05, 2018
Is Software Spoiling Us? Technical Innovations in the Department of Defense
Mar 15, 2018
Is Software Spoiling Us? Innovations in Daily Life from Software
Feb 08, 2018
How Risk Management Fits into Agile & DevOps in Government
Feb 01, 2018
5 Best Practices for Preventing and Responding to Insider Threat
Dec 28, 2017
Pharos Binary Static Analysis: An Update
Dec 12, 2017
Positive Incentives for Reducing Insider Threat
Nov 30, 2017
Mission-Practical Biometrics
Nov 16, 2017
At Risk Emerging Technology Domains
Oct 24, 2017
DNS Blocking to Disrupt Malware
Oct 12, 2017
Best Practices: Network Border Protection
Sep 21, 2017
Verifying Software Assurance with IBM’s Watson
Sep 07, 2017
The CERT Software Assurance Framework
Aug 31, 2017
Scaling Agile Methods
Aug 03, 2017
Ransomware: Best Practices for Prevention and Response
Jul 14, 2017
Integrating Security in DevOps
Jun 29, 2017
SEI Fellows Series: Peter Feiler
Jun 15, 2017
NTP Best Practices
May 25, 2017
Establishing Trust in Disconnected Environments
May 18, 2017
Distributed Artificial Intelligence in Space
Apr 20, 2017
Verifying Distributed Adaptive Real-Time Systems
Mar 27, 2017
10 At-Risk Emerging Technologies
Mar 23, 2017
Technical Debt as a Core Software Engineering Practice
Feb 27, 2017
DNS Best Practices
Feb 23, 2017
Three Roles and Three Failure Patterns of Software Architects
Jan 26, 2017
Security Modeling Tools
Jan 12, 2017
Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks
Dec 19, 2016
Cyber Security Engineering for Software and Systems Assurance
Dec 08, 2016
Moving Target Defense
Nov 30, 2016
Improving Cybersecurity Through Cyber Intelligence
Nov 10, 2016
A Requirement Specification Language for AADL
Oct 27, 2016
Becoming a CISO: Formal and Informal Requirements
Oct 19, 2016
Predicting Quality Assurance with Software Metrics and Security Methods
Oct 13, 2016
Network Flow and Beyond
Sep 29, 2016
A Community College Curriculum for Secure Software Development
Sep 15, 2016
Security and the Internet of Things
Aug 25, 2016
The SEI Fellow Series: Nancy Mead
Aug 10, 2016
An Open Source Tool for Fault Tree Analysis
Jul 28, 2016
Global Value Chain – An Expanded View of the ICT Supply Chain
Jul 18, 2016
Intelligence Preparation for Operational Resilience
Jun 21, 2016
Evolving Air Force Intelligence with Agile Techniques
May 26, 2016
Threat Modeling and the Internet of Things
May 12, 2016
Open Systems Architectures: When & Where to Be Closed
Apr 14, 2016
Toward Efficient and Effective Software Sustainment
Mar 18, 2016
Effective Reduction of Avoidable Complexity in Embedded Systems
Mar 18, 2016
Quality Attribute Refinement and Allocation
Mar 08, 2016
Is Java More Secure Than C?
Feb 19, 2016
Identifying the Architectural Roots of Vulnerabilities
Feb 04, 2016
Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
Feb 03, 2016
An Interview with Grady Booch
Jan 12, 2016
Structuring the Chief Information Security Officer Organization
Dec 23, 2015
How Cyber Insurance Is Driving Risk and Technology Management
Nov 09, 2015
A Field Study of Technical Debt
Oct 15, 2015
How the University of Pittsburgh Is Using the NIST Cybersecurity Framework
Oct 01, 2015
A Software Assurance Curriculum for Future Engineers
Sep 24, 2015
Four Types of Shift Left Testing
Sep 10, 2015
Capturing the Expertise of Cybersecurity Incident Handlers
Aug 27, 2015
Toward Speed and Simplicity: Creating a Software Library for Graph Analytics
Aug 27, 2015
Improving Quality Using Architecture Fault Analysis with Confidence Arguments
Aug 13, 2015
A Taxonomy of Testing Types
Jul 30, 2015
Reducing Complexity in Software & Systems
Jul 16, 2015
Designing Security Into Software-Reliant Systems
Jun 25, 2015
Agile Methods in Air Force Sustainment
Jun 11, 2015
Defect Prioritization With the Risk Priority Number
May 28, 2015
SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers
May 14, 2015
An Introduction to Context-Aware Computing
Apr 23, 2015
Data Driven Software Assurance
Apr 09, 2015
Supply Chain Risk Management: Managing Third Party and External Dependency Risk
Mar 26, 2015
Applying Agile in the DoD: Twelfth Principle
Mar 26, 2015
Introduction to the Mission Thread Workshop
Mar 12, 2015
Applying Agile in the DoD: Eleventh Principle
Feb 26, 2015
A Workshop on Measuring What Matters
Feb 20, 2015
Applying Agile in the DoD: Tenth Principle
Feb 12, 2015
Predicting Software Assurance Using Quality and Reliability Measures
Jan 29, 2015
Applying Agile in the DoD: Ninth Principle
Jan 16, 2015
Cyber Insurance and Its Role in Mitigating Cybersecurity Risk
Jan 08, 2015
AADL and Dassault Aviation
Dec 18, 2014
Tactical Cloudlets
Dec 04, 2014
Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs
Nov 27, 2014
Coding with AADL
Nov 13, 2014
The State of Agile
Oct 30, 2014
Applying Agile in the DoD: Eighth Principle
Oct 09, 2014
A Taxonomy of Operational Risks for Cyber Security
Oct 07, 2014
Agile Metrics
Sep 25, 2014
Four Principles for Engineering Scalable, Big Data Systems
Sep 11, 2014
An Appraisal of Systems Engineering: Defense v. Non-Defense
Aug 28, 2014
HTML5 for Mobile Apps at the Edge
Aug 14, 2014
Applying Agile in the DoD: Seventh Principle
Jul 24, 2014
AADL and Edgewater
Jul 10, 2014
Security and Wireless Emergency Alerts
Jun 26, 2014
Safety and Behavior Specification Using the Architecture Analysis and Design Language
Jun 12, 2014
Characterizing and Prioritizing Malicious Code
May 29, 2014
Applying Agile in the DoD: Sixth Principle
May 29, 2014
Using Quality Attributes to Improve Acquisition
May 15, 2014
Best Practices for Trust in the Wireless Emergency Alerts Service
Apr 29, 2014
Three Variations on the V Model for System and Software Testing
Apr 10, 2014
Adapting the PSP to Incorporate Verified Design by Contract
Mar 27, 2014
Comparing IT Risk Assessment and Analysis Methods
Mar 25, 2014
AADL and Aerospace
Mar 13, 2014
Assuring Open Source Software
Feb 27, 2014
Security Pattern Assurance through Roundtrip Engineering
Feb 13, 2014
The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
Feb 11, 2014
Applying Agile in the DoD: Fifth Principle
Jan 30, 2014
Software Assurance Cases
Jan 16, 2014
Raising the Bar - Mainstreaming CERT C Secure Coding Rules
Jan 07, 2014
AADL and Télécom Paris Tech
Dec 26, 2013
From Process to Performance-Based Improvement
Dec 12, 2013
An Approach to Managing the Software Engineering Challenges of Big Data
Nov 27, 2013
Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience
Nov 26, 2013
Situational Awareness Mashups
Nov 14, 2013
Applying Agile in the DoD: Fourth Principle
Oct 31, 2013
Architecting Systems of the Future
Oct 17, 2013
Acquisition Archetypes
Sep 26, 2013
Human-in-the-Loop Autonomy
Sep 12, 2013
Mobile Applications for Emergency Managers
Aug 29, 2013
Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions
Aug 27, 2013
Applying Agile in the DoD: Third Principle
Aug 15, 2013
DevOps - Transform Development and Operations for Fast, Secure Deployments
Jul 30, 2013
Application Virtualization as a Strategy for Cyber Foraging
Jul 25, 2013
Common Testing Problems: Pitfalls to Prevent and Mitigate
Jul 11, 2013
Joint Programs and Social Dilemmas
Jun 27, 2013
Applying Agile in the DoD: Second Principle
Jun 13, 2013
Managing Disruptive Events - CERT-RMM Experience Reports
Jun 11, 2013
Reliability Validation and Improvement Framework
May 23, 2013
The Business Case for Systems Engineering
May 09, 2013
Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity
May 09, 2013
Applying Agile in the DoD: First Principle
Apr 18, 2013
The Evolution of a Science Project
Apr 04, 2013
Securing Mobile Devices aka BYOD
Mar 26, 2013
What's New With Version 2 of the AADL Standard?
Mar 21, 2013
The State of the Practice of Cyber Intelligence
Mar 07, 2013
Mitigating Insider Threat - New and Improved Practices Fourth Edition
Feb 28, 2013
Technology Readiness Assessments
Feb 21, 2013
Standards in Cloud Computing Interoperability
Feb 07, 2013
Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk
Jan 31, 2013
The Latest Developments in AADL
Jan 17, 2013
The Fundamentals of Agile
Jan 03, 2013
Software for Soldiers who use Smartphones
Dec 20, 2012
Managing Disruptive Events: Making the Case for Operational Resilience
Dec 19, 2012
Architecting Service-Oriented Systems
Dec 06, 2012
The SEI Strategic Plan
Nov 15, 2012
Quantifying Uncertainty in Early Lifecycle Cost Estimation
Nov 01, 2012
Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities
Oct 23, 2012
Architecting a Financial System with TSP
Oct 18, 2012
The Importance of Data Quality
Oct 04, 2012
How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them
Sep 25, 2012
Misaligned Incentives
Sep 20, 2012
Cloud Computing for the Battlefield
Sep 04, 2012
An Architecture-Focused Measurement Framework for Managing Technical Debt
Sep 04, 2012
Agile Acquisition
Sep 04, 2012
How a Disciplined Process Enhances & Enables Agility
Sep 04, 2012
U.S. Postal Inspection Service Use of the CERT Resilience Management Model
Aug 21, 2012
Insights from the First CERT Resilience Management Model Users Group
Jul 17, 2012
NIST Catalog of Security and Privacy Controls, Including Insider Threat
Apr 24, 2012
Cisco's Adoption of CERT Secure Coding Standards
Feb 28, 2012
How to Become a Cyber Warrior
Jan 31, 2012
Considering Security and Privacy in the Move to Electronic Health Records
Dec 20, 2011
Measuring Operational Resilience
Oct 04, 2011
Why Organizations Need a Secure Domain Name System
Sep 06, 2011
Controls for Monitoring the Security of Cloud Services
Aug 02, 2011
Building a Malware Analysis Capability
Jul 12, 2011
Using the Smart Grid Maturity Model (SGMM)
May 05, 2011
Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM
Mar 29, 2011
Conducting Cyber Exercises at the National Level
Feb 22, 2011
Indicators and Controls for Mitigating Insider Threat
Jan 25, 2011
How Resilient Is My Organization?
Dec 09, 2010
Public-Private Partnerships: Essential for National Cyber Security
Nov 30, 2010
Software Assurance: A Master's Level Curriculum
Oct 26, 2010
How to Develop More Secure Software - Practices from Thirty Organizations
Sep 28, 2010
Mobile Device Security: Threats, Risks, and Actions to Take
Aug 31, 2010
Establishing a National Computer Security Incident Response Team (CSIRT)
Aug 19, 2010
Securing Industrial Control Systems
Jul 27, 2010
The Power of Fuzz Testing to Reduce Security Vulnerabilities
May 25, 2010
Protect Your Business from Money Mules
Apr 27, 2010
Train for the Unexpected
Mar 03, 2010
The Role of the CISO in Developing More Secure Software
Mar 02, 2010
Computer and Network Forensics: A Master's Level Curriculum
Feb 02, 2010
Introducing the Smart Grid Maturity Model (SGMM)
Jan 12, 2010
Leveraging Security Policies and Procedures for Electronic Evidence Discovery
Jan 09, 2010
Integrating Privacy Practices into the Software Development Life Cycle
Dec 22, 2009
Using the Facts to Protect Enterprise Networks: CERT's NetSA Team
Dec 01, 2009
Ensuring Continuity of Operations When Business Is Disrupted
Nov 10, 2009
Managing Relationships with Business Partners to Achieve Operational Resiliency
Oct 20, 2009
The Smart Grid: Managing Electrical Power Distribution and Use
Sep 29, 2009
Electronic Health Records: Challenges for Patient Privacy and Security
Sep 08, 2009
Mitigating Insider Threat: New and Improved Practices
Aug 18, 2009
Rethinking Risk Management
Jul 07, 2009
The Upside and Downside of Security in the Cloud
Jun 16, 2009
More Targeted, Sophisticated Attacks: Where to Pay Attention
May 26, 2009
Is There Value in Identifying Software Security "Never Events?"
May 05, 2009
Cyber Security, Safety, and Ethics for the Net Generation
Apr 14, 2009
An Experience-Based Maturity Model for Software Security
Mar 31, 2009
Mainstreaming Secure Coding Practices
Mar 17, 2009
Security: A Key Enabler of Business Innovation
Mar 03, 2009
Better Incident Response Through Scenario Based Training
Feb 17, 2009
An Alternative to Risk Management for Information and Software Security
Feb 03, 2009
Tackling Tough Challenges: Insights from CERT’s Director Rich Pethia
Jan 20, 2009
Climate Change: Implications for Information Technology and Security
Dec 09, 2008
Using High Fidelity, Online Training to Stay Sharp
Nov 25, 2008
Integrating Security Incident Response and e-Discovery
Nov 11, 2008
Concrete Steps for Implementing an Information Security Program
Oct 28, 2008
Virtual Communities: Risks and Opportunities
Oct 14, 2008
Developing Secure Software: Universities as Supply Chain Partners
Sep 30, 2008
Security Risk Assessment Using OCTAVE Allegro
Sep 16, 2008
Getting to a Useful Set of Security Metrics
Sep 02, 2008
How to Start a Secure Software Development Program
Aug 20, 2008
Managing Risk to Critical Infrastructures at the National Level
Aug 05, 2008
Analyzing Internet Traffic for Better Cyber Situational Awareness
Jul 28, 2008
Managing Security Vulnerabilities Based on What Matters Most
Jul 22, 2008
Identifying Software Security Requirements Early, Not After the Fact
Jul 08, 2008
Making Information Security Policy Happen
Jun 24, 2008
Becoming a Smart Buyer of Software
Jun 10, 2008
Building More Secure Software
May 27, 2008
Connecting the Dots Between IT Operations and Security
May 13, 2008
Getting in Front of Social Engineering
Apr 29, 2008
Using Benchmarks to Make Better Security Decisions
Apr 15, 2008
Protecting Information Privacy - How To and Lessons Learned
Apr 01, 2008
Initiating a Security Metrics Program: Key Points to Consider
Mar 18, 2008
Insider Threat and the Software Development Life Cycle
Mar 04, 2008
Tackling the Growing Botnet Threat
Feb 19, 2008
Building a Security Metrics Program
Feb 05, 2008
Inadvertent Data Disclosure on Peer-to-Peer Networks
Jan 22, 2008
Information Compliance: A Growing Challenge for Business Leaders
Jan 08, 2008
Internal Audit's Role in Information Security: An Introduction
Dec 10, 2007
What Business Leaders Can Expect from Security Degree Programs
Nov 27, 2007
The Path from Information Security Risk Assessment to Compliance
Nov 13, 2007
Computer Forensics for Business Leaders: Building Robust Policies and Processes
Oct 30, 2007
Business Resilience: A More Compelling Argument for Information Security
Oct 16, 2007
Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity
Oct 15, 2007
The Human Side of Security Trade-Offs
Sep 18, 2007
Dual Perspectives: A CIO's and CISO's Take on Security
Sep 04, 2007
Reducing Security Costs with Standard Configurations: U.S. Government Initiatives
Aug 07, 2007
Tackling Security at the National Level: A Resource for Leaders
Aug 07, 2007
Real-World Security for Business Leaders
Jul 24, 2007
Using Standards to Build an Information Security Program
Jul 10, 2007
Getting Real About Security Governance
Jun 26, 2007
Convergence: Integrating Physical and IT Security
Jun 12, 2007
IT Infrastructure: Tips for Navigating Tough Spots
May 29, 2007
The Value of De-Identified Personal Data
May 15, 2007
Adapting to Changing Risk Environments: Operational Resilience
May 01, 2007
Computer Forensics for Business Leaders: A Primer
Apr 17, 2007
The Real Secrets of Incident Management
Apr 03, 2007
The Legal Side of Global Security
Mar 20, 2007
A New Look at the Business of IT Education
Mar 06, 2007
Crisis Communications During a Security Incident
Feb 20, 2007
Assuring Mission Success in Complex Environments
Feb 06, 2007
Privacy: The Slow Tipping Point
Jan 23, 2007
Building Staff Competence in Security
Jan 09, 2007
Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology
Dec 26, 2006
Inside Defense-in-Depth
Dec 19, 2006
Protecting Against Insider Threat
Nov 28, 2006
Change Management: The Security 'X' Factor
Nov 14, 2006
CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT
Oct 31, 2006
Proactive Remedies for Rising Threats
Oct 17, 2006
Why Leaders Should Care About Security
Oct 17, 2006
Compliance vs. Buy-in
Oct 17, 2006
The ROI of Security
Oct 17, 2006