News

Potential differences in software bills of materials (SBOMs) for an individual piece of software can undermine confidence in ...
The one-day event in August will feature presentations on MBSE across the lifecycle, in Defense Department acquisition, and ...
Celebrating 40 years of advancing software for national security ...
This paper describes the challenges and pitfalls of using artificial intelligence for insider risk analysis and how to thoughtfully and efficiently use AI to find insider threats.
In this paper, the authors describe lessons learned from coordinating AI and ML vulnerabilities at the SEI's CERT/CC.
How do you analyze a large language model (LLM) for harmful biases? The 2022 release of ChatGPT launched LLMs onto the public stage. Applications that use LLMs are suddenly everywhere, from customer ...
This blog post explores the efficacy of ChatGPT 3.5 in identifying errors in software code.
This SEI Blog post examines ways you can leverage your software bill of materials (SBOM) data, using the SEI SBOM Framework, to improve your software security and inform your supply chain risk ...
Since its inception in 1984, the SEI has worked to make software do more, be more secure, deploy faster, and cost less; improving software systems vital to national defense and the broader information ...
This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.
This blog post presents 5 best practices from industry on implementing a zero trust architecture and discusses why they are significant.
This post explores tools for understanding vulnerabilities in the Rust programming language as well as the maturity of the Rust software ecosystem as a whole and how that might impact future security ...