SEI Digital Library
Latest Publications

I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
• Webcast
In this webcast, Destiney Plaza reveals five ways to protect yourself from getting your password cracked.
Watch
The Best and the Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
• Podcast
The SEI team that supported the President's Cup Cybersecurity Competition details their challenges, successes, and lessons learned.
Listen
A New Performance Zone for Software for National Security
• Webcast
In this webcast, Hasan Yasar, Will Hayes, and Joe Yankel assert that software engineering practices are an ingredient that should not be left behind as national security and defense organizations …
Watch
2024 SEI Year in Review
• Annual Report
The 2024 SEI Year in Review highlights the work of the institute undertaken during the fiscal year spanning October 1, 2023, to September 30, 2024.
Read
A Socio-Technical Perspective on Software Vulnerabilities: A Causal Analysis
• Article
This article investigates the causal relationships between the social behaviors of people developing software and effectively maintaining files related to software vulnerabilities.
Read
Identifying and Mitigating Cyber Risk
• Webcast
In this webcast, Matt Butkovic, Greg Crabbe, and Beth-Anne Bygum explore how best to align business and resilience objectives.
Watch
Updating Risk Assessment in the CERT Secure Coding Standard
• Podcast
This podcast explores proposed risk assessment updates to the CERT Secure Coding Standard.
Listen
Malware Research: If You Cannot Replicate it, You Will Not Use It
• Webcast
In this webcast, Leigh Metcalf and Edward Schwartz recommend ways to overcome the problem of replicating and reproducing academic malware research results, so that new and needed concepts and tools …
Watch
Delivering Next Generation Cyber Capabilities to the Warfighter
• Podcast
Gregory Touhill discusses work by CERT researchers and technologists to deliver rapid capabilities to warfighters in the DoD.
Listen
Kubernetes (k8s) in the Air Gap
• White Paper
This paper explains how the act of mirroring the required container images for a k8s deployment in the air gap has become increasingly simplified in the past few years.
Read