
Secure Software by Design Event Opens Call for Participation and Registration
• Press Release
The two-day event in August will promote security as an integral aspect of the entire software lifecycle.
Read More
New Research Supports SEI AISIRT Mission to Secure Artificial Intelligence
• Article
Academia, industry, and the SEI collaborated to illuminate the need for coordinated disclosure of AI vulnerabilities and propose solutions.
Read More
New DoD Memo Accelerates Software Acquisition Modernization
• Article
The directive signals an accelerated uptake of the Software Acquisition Pathway, which reforms software development and acquisition within the Defense Department.
Read More
Silent Sentinel Tool Automates Software Risk Analysis
• Article
The recently released open source tool provides software development and cybersecurity teams a consistent, repeatable process.
Read More
SEI Support for President's Cup Leaves Lasting Legacy
• Article
As CISA’s sixth annual cybersecurity competition begins with a new supporting vendor, the SEI looks back at five years of success.
Read More
2024 SEI Research Review Materials Now Available
• Article
The event’s videos, presentation slides, and posters showcase SEI methods, prototypes, and tools that address the nation’s software challenges.
Read More
Portend Toolset Creates Guardrails for Machine Learning Data Drift
• Article
The SEI’s new, open source toolset provides an end-to-end machine-learning assurance solution for simulating drift, detecting it in operation, and generating alerts.
Read MoreEvents
Call for Papers at HICSS-59
Apr 15-Jun 15, 2025
Known worldwide as the longest-standing working scientific conference in Information Technology Management, HICSS provides a highly interactive environment for top scholars from academia and industry to exchange ideas in various areas of information, computer, and system sciences.
RegisterMalware Research: If You Cannot Replicate it, You Will Not Use It
Apr 23, 2025 · 1:30-2:30PM (ET)
In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools can be more quickly used.
RegisterSoftware Architecture: Principles and Practices
Apr 28-May 1, 2025
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
Register