In this webcast, Eileen Wrubel and Brigid O’Hearn discuss the launch of the Software Acquisition Go Bag. Our SEI team has helped hundreds of DoD programs deliver software-enabled capability through ...
The study explores the risks and tradeoffs when adapting enterprise-IT security and zero trust principles to weapon systems.
DeCapria, D., 2025: DataOps: Towards More Reliable Machine Learning Systems. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Schmidt, D., and Sledge, C., 2016: A Naval Perspective on Open-Systems Architecture. Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
CERT Insider Threat Center, T., 2010: Welcome to the Insider Threat Blog. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed ...
Cassidy, T., and CERT Insider Threat Center, T., 2018: Substance Use and Abuse: Potential Insider Threat Implications for Organizations. Carnegie Mellon University ...
The SEI is participating at the SciTech Forum 2026 ...
Ruefle, R., 2017: Critical Asset Identification (Part 1 of 20: CERT Best Practices to Mitigate Insider Threats Series). Carnegie Mellon University, Software ...
Sherman, M., 2024: Using ChatGPT to Analyze Your Code? Not So Fast. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 27 ...
Shevchenko, N., 2020: An Introduction to Model-Based Systems Engineering (MBSE). Carnegie Mellon University, Software Engineering Institute's Insights (blog ...
Faatz, D., 2018: Best Practices for Cloud Security. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed October 22, 2025, https ...