News

Potential differences in software bills of materials (SBOMs) for an individual piece of software can undermine confidence in ...
This SEI Blog post describes efforts to develop fuzzy hashing, a technique to help analysts determine if two pieces of suspected malware are similar.
This SEI Blog post highlights the application of MDE tools for automatic code generation and provides a template for collecting information from MDE vendors.
With assistance from the U.S. Army Cyber Center of Excellence and industry, this three-day conference is designed to open the lines of communication between the military and commercial sector and ...
SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition) Complete the form below to register and download a free online copy of SEI CERT C++ Coding ...
Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses.
The one-day event in August will feature presentations on MBSE across the lifecycle, in Defense Department acquisition, and ...
Since its inception in 1984, the SEI has worked to make software do more, be more secure, deploy faster, and cost less; improving software systems vital to national defense and the broader information ...
Celebrating 40 years of advancing software for national security ...
This book discusses the importance of knowledge work to the success of modern organizations and explains the necessary steps for reshaping the way in which software development is conducted.
This SEI Blog post presents an approach for modeling and validating confidentiality using AADL, and 11 analysis rules for ensuring security model consistency.
Building software with memory-safe programming languages blocks 70% of the most dangerous security attacks. In this presentation, the author explains what memory safety is, walks through the ...