News
Defense Department and intelligence community stakeholders met with SEI experts to discuss how software-intensive programs can better implement MBSE.
CMU SEI is revolutionizing defense acquisition for software and systems—making it faster, leaner, and more innovative.
CERT Division The CERT Division is a leader in cybersecurity. We partner with government, industry, law enforcement, and academia to improve the security and resilience of computer systems and ...
SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition) Complete the form below to register and download a free online copy of SEI CERT C++ Coding ...
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.
With assistance from the U.S. Army Cyber Center of Excellence and industry, this three-day conference is designed to open the lines of communication between the military and commercial sector and ...
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
Since its inception in 1984, the SEI has worked to make software do more, be more secure, deploy faster, and cost less; improving software systems vital to national defense and the broader information ...
This paper proposes an alternative approach to ROI for justifying the cost of building architectural models of embedded computing resources for cyber-physical systems.
July 31, 2025—The Forum of Incident Response and Security Teams (FIRST) recently announced the induction of Richard D. Pethia into its prestigious Incident Response Hall of Fame at the global ...
This tutorial, given at the August 2017 CERT Data Science and Cybersecurity Symposium, offers training on data science in cybersecurity principles and practices for individuals with all backgrounds.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results