
New Paper Recommends Secure by Design Standard
• Article
SEI CERT Division director Greg Touhill coauthored an AFCEA International study on how to make more secure software systems.
Read More
Secure Software by Design Event Opens Call for Participation and Registration
• Press Release
The two-day event in August will promote security as an integral aspect of the entire software lifecycle.
Read More
New Research Supports SEI AISIRT Mission to Secure Artificial Intelligence
• Article
Academia, industry, and the SEI collaborated to illuminate the need for coordinated disclosure of AI vulnerabilities and propose solutions.
Read More
New DoD Memo Accelerates Software Acquisition Modernization
• Article
The directive signals an accelerated uptake of the Software Acquisition Pathway, which reforms software development and acquisition within the Defense Department.
Read More
Silent Sentinel Tool Automates Software Risk Analysis
• Article
The recently released open source tool provides software development and cybersecurity teams a consistent, repeatable process.
Read More
SEI Support for President's Cup Leaves Lasting Legacy
• Article
As CISA’s sixth annual cybersecurity competition begins with a new supporting vendor, the SEI looks back at five years of success.
Read More
2024 SEI Research Review Materials Now Available
• Article
The event’s videos, presentation slides, and posters showcase SEI methods, prototypes, and tools that address the nation’s software challenges.
Read MoreEvents
Malware Research: If You Cannot Replicate it, You Will Not Use It
Apr 23, 2025 · 1:30-2:30PM (ET)
In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools can be more quickly used.
RegisterSoftware Architecture: Principles and Practices
Apr 28-May 1, 2025
This 4-day course introduces participants to essential software architecture concepts in a real-world setting using case studies, examines the technical and organizational issues regarding software architectures, and emphasizes the importance of the business context in which systems are designed.
RegisterInsider Threat Analyst
May 6-8, 2025
This 3-day course presents strategies for collecting and analyzing data to prevent, detect, and respond to insider activity. It discusses various techniques and methods for designing, implementing, and measuring the effectiveness of various components of an insider threat data collection and analysis capability.
RegisterFoundations of Incident Management
May 13-16, 2025
This four-day course, recommended for those new to incident handling or security operations work, provides foundational knowledge for those who need to understand the functions of an incident management capability and how best to perform those functions.
RegisterAsh Carter Exchange on Innovation and National Security and A+ Expo 2025
Jun 2-4, 2025
Join us June 2-4, 2025, at The Ash Carter Exchange, co-located with the second AI+ Expo. This event, hosted by SCSP and Mrs. Stephanie Carter, is set to continue the extraordinary discussions and connections made at previous events.
Register