News

Software Engineering Institute (SEI) is marking 40 years as a cornerstone of advancing software as a strategic advantage for ...
The Software Engineering Institute is leading and advancing software and cybersecurity to solve the nation's toughest problems.
Recently, there has been a resurgence of malware that is spread via Microsoft Word macro capabilities. In 1999, CERT actually published an advisory about the Melissa virus, which leveraged macros to ...
This post summarizes the benefits, practices, and tools for using a modeling language and compares the capabilities of SysML and AADL for use in model-based systems engineering (MBSE).
In the previous post of our series analyzing and summarizing insider incidents across multiple sectors, we discussed some of the mandates and requirements associated.
The SEI is conducting research to help organizations significantly improve the time it takes to evolve their software, but why is software evolution relevant to organizations, and what is holding them ...
Having trouble clearly stating the scope of your insider threat program? Struggling with measuring the program's effectiveness? Failing to provide actionable intelligence to the program stakeholders?
Author page for William Anderson. Read articles written by this author and check out William's profile.
This SEI Blog post discusses the potential threats from disgruntled employees and provides practical strategies and tools for preventing and handling them.
The CERT National Insider Threat Center (NITC) has been researching insider threats since 2001. In this blog post, we provide an overview of the CERT Insider Threat Vulnerability Assessment ...
This SEI Blog post emphasizes the importance of establishing a policy to upgrade, replace, or retire unsupported software to mitigate cybersecurity risks.
This SEI Blog post is part of a series on insider threats and focuses on blocking data exfiltration, including technical and non-technical mitigation strategies.